Sciweavers

7189 search results - page 146 / 1438
» Connecting Design with Code
Sort
View
DAGSTUHL
2006
15 years 4 months ago
Clone Detector Use Questions: A List of Desirable Empirical Studies
Abstract. Code "clones" are similar segments of code that are frequently introduced by "scavenging" existing code, that is, reusing code by copying it and adapt...
Thomas R. Dean, Massimiliano Di Penta, Kostas Kont...
ICIP
2007
IEEE
16 years 4 months ago
Multiterminal Video Coding
Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source ...
Yang Yang, Vladimir Stankovic, Wei Zhao, Zixiang X...
SSS
2010
Springer
160views Control Systems» more  SSS 2010»
15 years 1 months ago
A Comparative Study of Rateless Codes for P2P Persistent Storage
Abstract. This paper evaluates the performance of two seminal rateless erasure codes, LT Codes and Online Codes. Their properties make them appropriate for coping with communicatio...
Heverson Borba Ribeiro, Emmanuelle Anceaume
ASPDAC
2006
ACM
176views Hardware» more  ASPDAC 2006»
15 years 9 months ago
Conversion of reference C code to dataflow model: H.264 encoder case study
– Model-based design is widely accepted in developing complex embedded system under intense time-to-market pressure. While it promises improved design productivity, the main bott...
Hyeyoung Hwang, Taewook Oh, Hyunuk Jung, Soonhoi H...
124
Voted
WWW
2008
ACM
16 years 3 months ago
Exploiting semantic web technologies to model web form interactions
Form mapping is the key problem that needs to be solved in order to get access to the hidden web. Currently available solutions for fully automatic mapping are not ready for comme...
Bernhard Krüpl, Robert Baumgartner, Wolfgang ...