Sciweavers

3107 search results - page 503 / 622
» Error-Correcting Source Code
Sort
View
ICDCS
2006
IEEE
15 years 9 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
ICPPW
2006
IEEE
15 years 9 months ago
Retargeting Image-Processing Algorithms to Varying Processor Grain Sizes
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
Sam Sander, Linda M. Wills
IIHMSP
2006
IEEE
148views Multimedia» more  IIHMSP 2006»
15 years 9 months ago
R-D Optimized Frame-Layer Bit Allocation for H.264
— The frame-layer bit allocation problem for H.264 is studied in this work. We first impose a GOP (Group of Pictures) structure on the underlying H.264 video, and then develop a...
Do-Kyoung Kwon, Mei-Yin Shen, C. C. Jay Kuo
INFOCOM
2006
IEEE
15 years 9 months ago
Achieving Repeatability of Asynchronous Events in Wireless Sensor Networks with EnviroLog
— Sensing events from dynamic environments are normally asynchronous and non-repeatable. This lack of repeatability makes it particularly difficult to statistically evaluate the...
Liqian Luo, Tian He, Gang Zhou, Lin Gu, Tarek F. A...
IRI
2006
IEEE
15 years 9 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...