Sciweavers

132 search results - page 10 / 27
» Healthcare IT as a source of resilience
Sort
View
WCRE
2010
IEEE
13 years 6 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
DCC
2007
IEEE
14 years 8 months ago
High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source
We consider a first-order Markov source, which is predictively encoded using a DPCM-style encoder. The quantized compressed prediction residual is transmitted over an erasure chan...
Shantanu Rane, David Rebollo-Monedero, Bernd Girod
P2P
2007
IEEE
14 years 2 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer
VTC
2007
IEEE
104views Communications» more  VTC 2007»
14 years 2 months ago
Soft-Bit Assisted Iterative AMR-WB Source-Decoding and Turbo-Detection of Channel-Coded Differential Space-Time Spreading Using
Abstract – Jointly optimised iterative source- and channel-decoding is used for enhancing the error resilience of the Adaptive Multi Rate WideBand (AMR-WB) speech codec. The resu...
Noor S. Othman, Mohammed El-Hajjar, Osamah Alamri,...
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
14 years 15 days ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor