Sciweavers

5962 search results - page 101 / 1193
» Working with Patterns and Code
Sort
View
TCSV
2008
341views more  TCSV 2008»
15 years 3 months ago
H.264-Based Compression of Bayer Pattern Video Sequences
Most consumer digital cameras use a single light sensor which captures color information using a color filter array (CFA). This produces a mosaic image, where each pixel location c...
Colin Doutre, Panos Nasiopoulos, Kostas N. Platani...
APSEC
2005
IEEE
15 years 9 months ago
Metrics for Analyzing Module Interactions in Large Software Systems
We present a new set of metrics for analyzing the interaction between the modules of a large software system. We believe that these metrics will be important to any automatic or s...
Santonu Sarkar, Avinash C. Kak, N. S. Nagaraja
IFIP
2004
Springer
15 years 8 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
NLDB
2000
Springer
15 years 6 months ago
Conceptual Patterns - A Consolidation of Coad's and Wohed's Approaches
: The information system analysis process is considered as a difficult phase during the information systems development. The difficulty lies in gathering relevant information from ...
Petia Wohed
TIT
2010
136views Education» more  TIT 2010»
14 years 10 months ago
The existence of concatenated codes list-decodable up to the hamming bound
We prove that binary linear concatenated codes with an outer algebraic code (specifically, a folded Reed-Solomon code) and independently and randomly chosen linear inner codes ach...
Venkatesan Guruswami, Atri Rudra