Sciweavers

1923 search results - page 377 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ISSTA
2006
ACM
14 years 1 months ago
Test input generation for java containers using state matching
The popularity of object-oriented programming has led to the wide use of container libraries. It is important for the reliability of these containers that they are tested adequate...
Willem Visser, Corina S. Pasareanu, Radek Pel&aacu...
MSWIM
2004
ACM
14 years 24 days ago
IEEE 802.11 rate adaptation: a practical approach
Today, three different physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a/b/g); they all provide multi-rate capabilities. To achieve a high performance under v...
Mathieu Lacage, Mohammad Hossein Manshaei, Thierry...
CIDR
2003
106views Algorithms» more  CIDR 2003»
13 years 8 months ago
Speculative Query Processing
Speculation is an every day phenomenon whereby one acts in anticipation of particular conditions that are likely to hold in the future. Computer science research has seen many suc...
Neoklis Polyzotis, Yannis E. Ioannidis
ICASSP
2010
IEEE
13 years 7 months ago
High order motion interpolation for side information improvement in DVC
A key step in distributed video coding is the generation of the side information (SI) i.e. the estimation of the Wyner-Ziv frame (WZF). This step is also frequently called image i...
Giovanni Petrazzuoli, Marco Cagnazzo, Béatr...
BMCBI
2007
153views more  BMCBI 2007»
13 years 7 months ago
MPHASYS: a mouse phenotype analysis system
Background: Systematic, high-throughput studies of mouse phenotypes have been hampered by the inability to analyze individual animal data from a multitude of sources in an integra...
R. Brent Calder, Rudolf B. Beems, Harry van Steeg,...