Sciweavers

2797 search results - page 135 / 560
» Code query by example
Sort
View
ICASSP
2008
IEEE
15 years 9 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
SASP
2008
IEEE
101views Hardware» more  SASP 2008»
15 years 9 months ago
Custom Processor Core Construction from C Code
—In this paper we present a method for construction of application specific processor cores from a given C code. Our approach consists of three phases. We start by quantifying t...
Jelena Trajkovic, Daniel D. Gajski
VL
2008
IEEE
151views Visual Languages» more  VL 2008»
15 years 9 months ago
Codetrail: Connecting source code and web resources
When faced with the need for documentation, examples, bug fixes, error descriptions, code snippets, workarounds, templates, patterns, or advice, software developers frequently tu...
Max Goldman, Robert C. Miller
ICC
2007
IEEE
15 years 9 months ago
Optimizing Linear Dispersion Codes for Wideband MIMO Systems
Abstract— We consider the problem of designing space-timefrequency linear dispersion (LD) codes in wideband multipleinput multiple-output (MIMO) antenna systems employing orthogo...
Luca Venturino, Narayan Prasad, Xiaodong Wang, Moh...
IPPS
2007
IEEE
15 years 9 months ago
Code Compression and Decompression for Instruction Cell Based Reconfigurable Systems
Code compression has been applied to embedded systems to minimize the silicon area utilized for program memories, and lower the power consumption. More recently, it has become a n...
Nazish Aslam, Mark Milward, Ioannis Nousias, Tughr...