Sciweavers

571 search results - page 103 / 115
» Performing causality analysis by bounded model checking
Sort
View
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
15 years 6 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...
MINENET
2005
ACM
15 years 5 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...
FSTTCS
2003
Springer
15 years 4 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
INFOCOM
2005
IEEE
15 years 5 months ago
Online time-constrained scheduling in linear networks
— We consider the problem of scheduling a sequence of packets over a linear network, where every packet has a source and a target, as well as a release time and a deadline by whi...
Joseph Naor, Adi Rosén, Gabriel Scalosub
JMLR
2012
13 years 2 months ago
Globally Optimizing Graph Partitioning Problems Using Message Passing
Graph partitioning algorithms play a central role in data analysis and machine learning. Most useful graph partitioning criteria correspond to optimizing a ratio between the cut a...
Elad Mezuman, Yair Weiss