Sciweavers

2604 search results - page 357 / 521
» Human Errors and System Requirements
Sort
View
CORR
2010
Springer
261views Education» more  CORR 2010»
13 years 6 months ago
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel
In this paper, we show that over the binary erasure channel, Quasi-Cyclic LDPC codes can efficiently accommodate the hybrid iterative/ML decoding. We demonstrate that the quasicycl...
Mathieu Cunche, Valentin Savin, Vincent Roca
ICIP
2007
IEEE
14 years 10 months ago
View Synthesis for Robust Distributed Video Compression in Wireless Camera Networks
We propose a method for delivering error-resilient video from wireless camera networks in a distributed fashion over lossy channels. Our scheme is based on distributed source codi...
Chuohao Yeo, Jiajun Wang, Kannan Ramchandran
SIGCOMM
2004
ACM
14 years 2 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
CCS
2011
ACM
12 years 9 months ago
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
We empirically analyzed sanitizer use in a shipping web application with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of whi...
Prateek Saxena, David Molnar, Benjamin Livshits
AIRWEB
2009
Springer
14 years 3 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer