Sciweavers

2945 search results - page 443 / 589
» Noisy Network Coding
Sort
View
OSDI
1996
ACM
14 years 11 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
JVCIR
2006
163views more  JVCIR 2006»
14 years 10 months ago
Layered H.264 video transmission with hierarchical QAM
In multimedia communication systems, channel bandwidth and probability of error are the two main limitations that affect the quality of service. Therefore, in applications such as...
Mohammad Mahdi Ghandi, Mohammed Ghanbari
BMCBI
2006
181views more  BMCBI 2006»
14 years 10 months ago
The comprehensive updated regulatory network of Escherichia coli K-12
Background: Escherichia coli is the model organism for which our knowledge of its regulatory network is the most extensive. Over the last few years, our project has been collectin...
Heladia Salgado, Alberto Santos-Zavaleta, Socorro ...
93
Voted
AINA
2007
IEEE
15 years 4 months ago
Database-Driven Grid Computing with GridBASE
The GridBASE framework for database-driven grid computing is presented. The design and a prototype implementation of the framework is discussed. Industry-strength database technol...
Hans De Sterck, Chen Zhang, Aleks Papo
ICNP
1999
IEEE
15 years 2 months ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König