Programming exercises are an important part of an introductory course in programming. To improve the focus on encapsulation, requirements-based testing and give better feedback gi...
In 2001 we started a new project at our company. Undermanned, short on time, and under the gun to succeed, we knew that we needed a process that would help us stay on track. Unfor...
We describe ITS4, a tool for statically scanning security-critical C source code for vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ...
Efforts to build high-speed hardware for many different entropy coders are limited by fundamental feedback loops. Here is a method that allows for parallel compression in hardware...
Martin P. Boliek, James D. Allen, Edward L. Schwar...
We consider adaptive two-channel multiple-description coding. We provide an analytical method for designing a resolutionconstrained symmetrical multiple-description coder that use...
Janusz Klejsa, Marcin Kuropatwinski, W. Bastiaan K...