Sciweavers

2658 search results - page 486 / 532
» On efficient balanced codes
Sort
View
TKDE
2010
272views more  TKDE 2010»
15 years 2 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
WICOMM
2010
70views more  WICOMM 2010»
15 years 2 months ago
Distributed timeslot allocation with crossed slots in CDMA-TDD systems
Code division multiple access system with time division duplex (CDMA-TDD) is a promising solution to cope with traffic asymmetry of downlink and uplink in multimedia services. Whe...
Ki Won Sung, Chae Y. Lee
147
Voted
ICIP
2010
IEEE
15 years 2 months ago
High quality scanned book compression using pattern matching
This paper proposes a hybrid approximate pattern matching/ transform-based compression engine. The idea is to use regular video interframe prediction as a pattern matching algorit...
Alexandre Zaghetto, Ricardo L. de Queiroz
LPAR
2010
Springer
15 years 2 months ago
Verifying Pointer and String Analyses with Region Type Systems
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann
MICRO
2010
IEEE
99views Hardware» more  MICRO 2010»
15 years 2 months ago
ScalableBulk: Scalable Cache Coherence for Atomic Blocks in a Lazy Environment
Recently-proposed architectures that continuously operate on atomic blocks of instructions (also called chunks) can boost the programmability and performance of shared-memory mult...
Xuehai Qian, Wonsun Ahn, Josep Torrellas