Sciweavers

1040 search results - page 158 / 208
» A Comparative Performance Evaluation of Write Barrier Implem...
Sort
View
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
ICC
2007
IEEE
14 years 3 months ago
Supporting VCR Functions in P2P VoD Services Using Ring-Assisted Overlays
—Peer-to-Peer (P2P) networks have been shown to be a promising approach to providing large-scale Video-on-Demand (VoD) services over the Internet for their potential scalability....
Bin Cheng, Hai Jin, Xiaofei Liao
APN
2007
Springer
14 years 3 months ago
The ComBack Method - Extending Hash Compaction with Backtracking
This paper presents the ComBack method for explicit state space exploration. The ComBack method extends the well-known hash compaction method such that full coverage of the state s...
Michael Westergaard, Lars Michael Kristensen, Gert...
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
14 years 3 months ago
A leader-based parallel cross entropy algorithm for MCP
The Cross Entropy algorithm is a new search method for combinatorial problem. However, it needs considerable computational time to achieve good solution quality. To make the Cross...
Zhanhua Bai, Qiang Lv
BROADNETS
2006
IEEE
14 years 3 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...