Sciweavers

5962 search results - page 273 / 1193
» Working with Patterns and Code
Sort
View
INFOCOM
2010
IEEE
15 years 3 months ago
Bargaining and Price-of-Anarchy in Repeated Inter-Session Network Coding Games
— Most of the previous work on network coding has assumed that the users are not selfish and always follow the designed coding schemes. However, recent results have shown that s...
Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W...
123
Voted
ICSE
2009
IEEE-ACM
15 years 11 months ago
Succession: Measuring transfer of code and developer productivity
Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect ...
Audris Mockus
125
Voted
ICIP
2008
IEEE
15 years 11 months ago
Buffer constrained rate control for low bitrate dual-frame video coding
In dual-frame video coding, one long-term reference (LTR) and one short-term reference (STR) frames are used for motion estimation and compensation. In previous work, it was shown...
Mayank Tiwari, Theodore Groves, Pamela C. Cosman
ICC
2007
IEEE
15 years 11 months ago
Cooperative Concatenated Coding for Wireless Systems
– Cooperative transmission has been of growing interest recently where users take advantage of each other’s resources for better overall performance. In this paper, coded coope...
Ernest S. Lo, Khaled Ben Letaief
RAID
2001
Springer
15 years 9 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson