Sciweavers

555 search results - page 56 / 111
» Polar codes are optimal for lossy source coding
Sort
View
IJACTAICIT
2010
123views more  IJACTAICIT 2010»
14 years 9 months ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata
84
Voted
DCC
2001
IEEE
15 years 11 months ago
Video Coding for Streaming Media Delivery on the Internet
We provide an overview of an architecture of today's Internet streaming media delivery networks and describe various problems that such systems pose with regard to video codin...
Gregory J. Conklin, Gary S. Greenbaum, Karl Olav L...
APPINF
2003
15 years 1 months ago
Extracting High-level Architecture from Existing Code with Summary Models
Evolution of existing large telecommunications software currently became an important issue. Efficient methods are needed to componentize existing software identify existing compo...
Nikolai Mansurov, Djenana Campara
CORR
2008
Springer
212views Education» more  CORR 2008»
14 years 12 months ago
Joint Adaptive Modulation-Coding and Cooperative ARQ for Wireless Relay Networks
This paper presents a cross-layer approach to jointly design adaptive modulation and coding (AMC) at the physical layer and cooperative truncated automatic repeat request (ARQ) pro...
Morteza Mardani, Jalil S. Harsini, Farshad Lahouti...
JSAC
2010
147views more  JSAC 2010»
14 years 10 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...