Sciweavers

4004 search results - page 33 / 801
» How Many Packets Can We Encode
Sort
View
ICCAD
1994
IEEE
134views Hardware» more  ICCAD 1994»
14 years 2 months ago
Boolean constrained encoding: a new formulation and a case study
1 This paper provides a new, generalized approach to the problem of encoding information as vectors of binary digits. We furnish a formal definition for the Boolean constrained enc...
Ney Laert Vilar Calazans
GPEM
2006
82views more  GPEM 2006»
13 years 10 months ago
Shortcomings with using edge encodings to represent graph structures
There are various representations for encoding graph structures, such as artificial neural networks (ANNs) and circuits, each with its own strengths and weaknesses. Here we analyz...
Gregory Hornby
DSN
2009
IEEE
14 years 1 months ago
An efficient XOR-scheduling algorithm for erasure codes encoding
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data w...
Jianqiang Luo, Lihao Xu, James S. Plank
VLDB
2007
ACM
113views Database» more  VLDB 2007»
14 years 10 months ago
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures
We propose a novel string search algorithm for data stored once and read many times. Our search method combines the sublinear traversal of the record (as in Boyer Moore or Knuth-M...
Witold Litwin, Riad Mokadem, Philippe Rigaux, Thom...
DAGM
2004
Springer
14 years 3 months ago
The Redundancy Pyramid and Its Application to Segmentation on an Image Sequence
Abstract. Irregular pyramids organize a sequence of partitions of images in such a way that each partition is deduced from the preceding one by union of some of its regions. In thi...
Jocelyn Marchadier, Walter G. Kropatsch, Allan Han...