Sciweavers

2863 search results - page 289 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
VTC
2007
IEEE
149views Communications» more  VTC 2007»
15 years 10 months ago
An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and
— In this paper, we characterize the achievable performance of a wavelet encoding-based videophone system, which further compresses and protects the wavelet-based video codec’s...
Anh Quang Pham, Jin Wang, Lie-Liang Yang, Lajos Ha...
TOCS
2008
72views more  TOCS 2008»
15 years 4 months ago
Rethink the sync
We introduce external synchrony, a new model for local file I/O that provides the reliability and simplicity of synchronous I/O, yet also closely approximates the performance of a...
Edmund B. Nightingale, Kaushik Veeraraghavan, Pete...
AAAI
1994
15 years 5 months ago
Recovering Software Specifications with Inductive Logic Programming
We consider using machine learning techniques to help understand a large software system. In particular, we describe how learning techniques can be used to reconstruct abstract Da...
William W. Cohen
ISCAS
2006
IEEE
76views Hardware» more  ISCAS 2006»
15 years 10 months ago
Flexible hardware architectures for curve-based cryptography
— This paper compares implementations of elliptic and hyperelliptic curve cryptography (ECC and HECC) on an FPGA platform. We use the same low-level blocks to implement the basic...
Lejla Batina, Nele Mentens, Bart Preneel, Ingrid V...
PERCOM
2007
ACM
16 years 4 months ago
Hoarding Context Information with Context Clusters
The components of a context-aware system can often become disconnected because of the dynamic environments within which they are deployed. Hoarding context information on the clie...
Myilone Anandarajah, Ricky Robinson, Jadwiga Indul...