Sciweavers

2655 search results - page 191 / 531
» LT Network Codes
Sort
View
140
Voted
TC
2010
14 years 7 months ago
Generating Reliable Code from Hybrid-Systems Models
Hybrid systems have emerged as an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. Under this paradigm, distr...
Madhukar Anand, Sebastian Fischmeister, Yerang Hur...
113
Voted
TIT
2010
112views Education» more  TIT 2010»
14 years 7 months ago
Asymmetric multilevel diversity coding and asymmetric Gaussian multiple descriptions
We consider the asymmetric multilevel diversity (A-MLD) coding problem, where a set of 2 K 1 information sources, ordered in a decreasing level of importance, is encoded into K me...
Soheil Mohajer, Chao Tian, Suhas N. Diggavi
132
Voted
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
15 years 7 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
EUSAI
2004
Springer
15 years 6 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
112
Voted
ESORICS
2000
Springer
15 years 4 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud