Sciweavers

5056 search results - page 230 / 1012
» Network Coding Theory
Sort
View
TIP
2008
95views more  TIP 2008»
15 years 3 months ago
Optimization of Packetization Masks for Image Coding Based on an Objective Cost Function for Desired Packet Spreading
In image communication over lossy packet networks (e.g., cell phone communication) packet loss errors lead to damaged images. Damaged images can be repaired with passive error conc...
Joost Rombaut, Aleksandra Pizurica, Wilfried Phili...
109
Voted
LCN
2007
IEEE
15 years 9 months ago
Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption
- Multiple distribution trees and multiple description (MD) coding are highly robust since they provide redundancy both in network paths and data. However, MD coded streaming inclu...
Sunoh Choi, Sang-Seon Byun, Chuck Yoo
137
Voted
AINA
2007
IEEE
15 years 7 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
MSR
2011
ACM
14 years 6 months ago
A simpler model of software readability
Software readability is a property that influences how easily a given piece of code can be read and understood. Since readability can affect maintainability, quality, etc., prog...
Daryl Posnett, Abram Hindle, Premkumar T. Devanbu
IPPS
2010
IEEE
15 years 1 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...