Sciweavers

1282 search results - page 93 / 257
» Practical Loss-Resilient Codes
Sort
View
125
Voted
ICFEM
2010
Springer
15 years 3 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
TAP
2010
Springer
134views Hardware» more  TAP 2010»
15 years 3 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney
CSMR
2011
IEEE
14 years 8 months ago
RTFM (Read the Factual Mails) - Augmenting Program Comprehension with Remail
—The advent of globalization has led to the adoption of distributed software development as a common practice. One of its drawbacks -the absence of impromptu meetingsis tackled w...
Alberto Bacchelli, Michele Lanza, Vitezslav Humpa
ICC
2009
IEEE
176views Communications» more  ICC 2009»
15 years 12 months ago
Error Resilient Non-Asymmetric Slepian-Wolf Coding
Abstract—We consider non-asymmetric distributed source coding (DSC) that achieves any point in the Slepian-Wolf (SW) region. We study the error propagation phenomena and propose ...
Cédric Herzet, Velotiaray Toto-Zarasoa, Ali...
ICDCS
2008
IEEE
15 years 11 months ago
DCAR: Distributed Coding-Aware Routing in Wireless Networks
—Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless ...
Jilin Le, John C. S. Lui, Dah-Ming Chiu