Sciweavers

1336 search results - page 25 / 268
» codes 2005
Sort
View
ACMSE
2005
ACM
15 years 3 months ago
A metaprogramming approach to generating optimized code for algorithms in linear algebra
an extended abstract for a poster that presents a new approach that employs metaprogramming to generate optimized code for algorithms in Linear Algebra. Categories and Subject Des...
Najaf A. Shah, Anthony Skjellum
ESA
2005
Springer
155views Algorithms» more  ESA 2005»
15 years 3 months ago
A Loopless Gray Code for Minimal Signed-Binary Representations
A string . . . a2a1a0 over the alphabet {−1, 0, 1} is said to be a minimal signed-binary representation of an integer n if n =   k≥0 ak2k and the number of non-zero digits is ...
Gurmeet Singh Manku, Joe Sawada
ECOOP
2005
Springer
15 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
66
Voted
ICMCS
2005
IEEE
143views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Rate-distortion estimation for H.264/AVC coders
In a video coder, the optimal coding mode decision for each coding block could be achieved by exhaustively calculating the Lagrange cost (which includes the coding distortion plus...
Yu-Kuang Tu, Jar-Ferr Yang, Ming-Ting Sun
ADHOCNOW
2005
Springer
15 years 3 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz