Sciweavers

473 search results - page 31 / 95
» Computing excluded minors
Sort
View
63
Voted
ICC
2007
IEEE
15 years 4 months ago
Determination of Optimal Distortion-Based Protection in Progressive Image Transmission: a Heuristic Approach
— In this paper a method for the fast determination of distortion-based optimal unequal error protection (UEP) of bitstreams generated by embedded image coders is described. The ...
Alessio Torquati, Maria Fresia, Fabio Lavagetto
ICSEA
2006
IEEE
15 years 4 months ago
Analysing Countermeasures Against Privacy-Invasive Software
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of countermeasures try to mitigate the negative effects caused b...
Martin Boldt, Bengt Carlsson
88
Voted
LICS
2006
IEEE
15 years 4 months ago
Variables as Resource in Hoare Logics
Hoare logic is bedevilled by complex but coarse side conditions on the use of variables. We define a logic, free of side conditions, which permits more precise statements of a pr...
Matthew J. Parkinson, Richard Bornat, Cristiano Ca...
CBSE
2005
Springer
15 years 3 months ago
Tailored Responsibility Within Component-Based Systems
The concept of responsibility aims at making a computing system trustworthy for its users despite the fact that failures of IT systems cannot be completely excluded. The presented ...
Elke Franz, Ute Wappler
CSL
2004
Springer
15 years 3 months ago
Fixed Points of Type Constructors and Primitive Recursion
Abstract. For nested or heterogeneous datatypes, terminating recursion schemes considered so far have been instances of iteration, excluding efficient definitions of fixed-point ...
Andreas Abel, Ralph Matthes