Sciweavers

1282 search results - page 139 / 257
» Practical Loss-Resilient Codes
Sort
View
FASE
2006
Springer
15 years 4 months ago
A Graph-Based Approach to Transform XML Documents
Abstract. As XML diffusion keeps increasing, it is today common practice for most developers to deal with XML parsing and transformation. XML is used as format to e.g. render data,...
Gabriele Taentzer, Giovanni Toffetti Carughi
111
Voted
IPAS
2007
15 years 3 months ago
Prediction of signs of DCT coefficients in block-based lossy image compression
A practical impossibility of prediction of signs of DCT coefficients is generally accepted. Therefore each coded sign of DCT coefficients occupies usually 1 bit of memory in compr...
Nikolay N. Ponomarenko, Andriy V. Bazhyna, Karen O...
103
Voted
FPL
2008
Springer
150views Hardware» more  FPL 2008»
15 years 2 months ago
Compiler generated systolic arrays for wavefront algorithm acceleration on FPGAs
Wavefront algorithms, such as the Smith-Waterman algorithm, are commonly used in bioinformatics for exact local and global sequence alignment. These algorithms are highly computat...
Betul Buyukkurt, Walid A. Najjar
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 2 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
117
Voted
ESE
2008
112views Database» more  ESE 2008»
15 years 22 days ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey