Sciweavers

2945 search results - page 288 / 589
» Noisy Network Coding
Sort
View
ICDCSW
2003
IEEE
15 years 9 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
USENIX
2007
15 years 6 months ago
Events Can Make Sense
Tame is a new event-based system for managing concurrency in network applications. Code written with Tame abstractions does not suffer from the “stackripping” problem associat...
Maxwell N. Krohn, Eddie Kohler, M. Frans Kaashoek
JCP
2006
131views more  JCP 2006»
15 years 3 months ago
Compression of Short Text on Embedded Systems
Abstract-- The paper details a scheme for lossless compression of short data series larger than 50 Bytes. The method uses arithmetic coding and context modeling with a low-complexi...
Stephan Rein, Clemens Gühmann, Frank H. P. Fi...
MTA
2010
108views more  MTA 2010»
15 years 2 months ago
A reduced-reference structural similarity approximation for videos corrupted by channel errors
Abstract In this paper we propose a reduced-reference quality assessment algorithm which computes an approximation of the Structural SIMilarity (SSIM) metrics exploiting coding too...
Marco Tagliasacchi, Giuseppe Valenzise, Matteo Nac...
ECEASST
2010
15 years 1 months ago
Open Source Verification under a Cloud
Abstract: An experiment in providing volunteer cloud computing support for automated audits of open source code is described here, along with the supporting theory. Certification a...
Peter T. Breuer, Simon Pickin