Sciweavers

2945 search results - page 153 / 589
» Noisy Network Coding
Sort
View
117
Voted
MM
2010
ACM
125views Multimedia» more  MM 2010»
15 years 3 months ago
Tenor: making coding practical from servers to smartphones
It has been theoretically shown that performing coding in networked systems, including Reed-Solomon codes, fountain codes, and random network coding, has a clear advantage with re...
Hassan Shojania, Baochun Li
162
Voted
CODES
2009
IEEE
15 years 6 months ago
Squashing microcode stores to size in embedded systems while delivering rapid microcode accesses
Microcoded customized IPs offer superior performance and direct programmability of micro-architectural structures compared to instruction-based processors, yet at the cost of dra...
Chengmo Yang, Mingjing Chen, Alex Orailoglu
146
Voted
RAID
2010
Springer
15 years 1 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
121
Voted
WRAC
2005
Springer
15 years 9 months ago
Harnessing Self-modifying Code for Resilient Software
In this paper we argue that self-modifying code can become a better strategy for realizing long-lived autonomous software systems than static code, regardless how well it was valid...
Christian F. Tschudin, Lidia Yamamoto
115
Voted
ICIC
2005
Springer
15 years 9 months ago
Automatic Construction of Bayesian Networks for Conversational Agent
Abstract. As the information in the internet proliferates, the methods for effectively providing the information have been exploited, especially in conversational agents. Bayesian ...
Sungsoo Lim, Sung-Bae Cho