Sciweavers

1005 search results - page 116 / 201
» On genomic coding theory
Sort
View
153
Voted
ICFP
2003
ACM
16 years 3 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
126
Voted
TCSV
2002
121views more  TCSV 2002»
15 years 3 months ago
Rate-constrained multihypothesis prediction for motion-compensated video compression
Abstract-- This article investigates linearly combined motion-compensated signals for video compression. In particular, we discuss multiple motion-compensated signals that are join...
Markus Flierl, Thomas Wiegand, Bernd Girod
128
Voted
DCC
2007
IEEE
16 years 3 months ago
Lossless Transmission of Correlated Sources over a Multiple Access Channel with Side Information
In this paper, we consider lossless transmission of arbitrarily correlated sources over a multiple access channel. Characterization of the achievable rates in the most general set...
Deniz Gündüz, Elza Erkip
126
Voted
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
15 years 10 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer
133
Voted
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 9 months ago
Factorial representations to generate arbitrary search distributions
A powerful approach to search is to try to learn a distribution of good solutions (in particular of the dependencies between their variables) and use this distribution as a basis ...
Marc Toussaint