Sciweavers

4004 search results - page 78 / 801
» How Many Packets Can We Encode
Sort
View
CPC
2008
86views more  CPC 2008»
15 years 1 months ago
Enumeration Schemes for Restricted Permutations
Abstract. Zeilberger's enumeration schemes can be used to completely automate the enumeration of many permutation classes. We extend his enumeration schemes so that they apply...
Vincent Vatter
BMCBI
2006
123views more  BMCBI 2006»
15 years 2 months ago
How to decide? Different methods of calculating gene expression from short oligonucleotide array data will give different result
Background: Short oligonucleotide arrays for transcript profiling have been available for several years. Generally, raw data from these arrays are analysed with the aid of the Mic...
Frank F. Millenaar, John Okyere, Sean T. May, Mart...
106
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
Layered Multicast Recovery
We study the problem of localizing repair packets when packets are lost. When repair packets are multicasted, a highly lossy receiver may swamp the entire multicast “group” wi...
Injong Rhee, Srinath R. Joshi, Minsuk Lee, S. Muth...
116
Voted
INFOCOM
1996
IEEE
15 years 6 months ago
A Reliable, Adaptive Network Protocol for Video Transport
In thispaper, we present anadaptive networklayer protocol for VBR video transport. It: (1) minimizes buffer requirement in the network whileguaranteeingthat packets of VBR encoded...
Pawan Goyal, Harrick M. Vin, Chia Shen, Prashant J...
MIPS
2004
Springer
121views Multimedia» more  MIPS 2004»
15 years 8 months ago
Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes
With many multimedia delivery schemes a client does not necessarily receive a given media content entirely (e.g. router congestions can lead some information to be lost). Mechanism...
Christoph Neumann, Vincent Roca