Sciweavers

193 search results - page 29 / 39
» A New Redundancy Reducing Cipher
Sort
View
DSN
2008
IEEE
14 years 2 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
GLOBECOM
2008
IEEE
14 years 2 months ago
A Memory-Optimized Bloom Filter Using an Additional Hashing Function
— A Bloom filter is a simple space-efficient randomized data structure for the representation set of items in order to support membership queries. In recent years, Bloom filte...
Mahmood Ahmadi, Stephan Wong
ICMCS
2008
IEEE
194views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Sparse FEC codes for flexible media protection
In this paper, we study block codes that are optimized to recover some lost source data even in case when full recovery is not possible. Conventionally, block codes designed for p...
Jari Korhonen, Pascal Frossard
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
14 years 2 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin
HASE
2007
IEEE
14 years 2 months ago
Integrating Product-Line Fault Tree Analysis into AADL Models
Fault Tree Analysis (FTA) is a safety-analysis technique that has been recently extended to accommodate product-line engineering for critical domains. This paper describes a tool-...
Hongyu Sun, Miriam Hauptman, Robyn R. Lutz