Sciweavers

2478 search results - page 391 / 496
» Universality in two dimensions
Sort
View
96
Voted
TIT
2002
78views more  TIT 2002»
15 years 9 days ago
Tradeoffs between the excess-code-length exponent and the excess-distortion exponent in lossy source coding
Lossy compression of a discrete memoryless source (DMS) with respect to a single-letter distortion measure is considered. We study the best attainable tradeoff between the exponent...
Tsachy Weissman, Neri Merhav
TOCS
2002
70views more  TOCS 2002»
15 years 9 days ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
94
Voted
TON
2002
99views more  TON 2002»
15 years 9 days ago
Beyond folklore: observations on fragmented traffic
Fragmented IP traffic is a poorly understood component of the overall mix of traffic on the Internet. Many assertions about the nature and extent of fragmented traffic are anecdota...
Colleen Shannon, David Moore, Kimberly C. Claffy
108
Voted
IJMI
2010
149views more  IJMI 2010»
14 years 11 months ago
Analysis of communicative behaviour: Profiling roles and activities
In this paper, we discuss how profiles of communicative behaviour can be used to present and analyse information about role activity recorded through structured observation of spec...
Inger Dybdahl Sørby, Øystein Nytr&os...
OOPSLA
2010
Springer
14 years 11 months ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...