Sciweavers

677 search results - page 113 / 136
» On the reconstruction of perfect codes
Sort
View
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 3 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
FAST
2007
14 years 11 months ago
REO: A Generic RAID Engine and Optimizer
Present day applications that require reliable data storage use one of five commonly available RAID levels to protect against data loss due to media or disk failures. With a mark...
Deepak R. Kenchammana-Hosekote, Dingshan He, James...
CORR
2006
Springer
86views Education» more  CORR 2006»
14 years 9 months ago
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov Random Processes
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements ...
Nan Liu, Sennur Ulukus
CORR
2006
Springer
95views Education» more  CORR 2006»
14 years 9 months ago
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements ...
Nan Liu, Sennur Ulukus
TOG
2008
128views more  TOG 2008»
14 years 9 months ago
VirtualStudio2Go: digital video composition for real environments
We synchronize film cameras and LED lighting with off-the-shelf video projectors. Radiometric compensation allows displaying keying patterns and other spatial codes on arbitrary r...
Anselm Grundhöfer, Oliver Bimber