Sciweavers

1005 search results - page 116 / 201
» On genomic coding theory
Sort
View
ICFP
2003
ACM
14 years 7 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
TCSV
2002
121views more  TCSV 2002»
13 years 7 months ago
Rate-constrained multihypothesis prediction for motion-compensated video compression
Abstract-- This article investigates linearly combined motion-compensated signals for video compression. In particular, we discuss multiple motion-compensated signals that are join...
Markus Flierl, Thomas Wiegand, Bernd Girod
DCC
2007
IEEE
14 years 7 months ago
Lossless Transmission of Correlated Sources over a Multiple Access Channel with Side Information
In this paper, we consider lossless transmission of arbitrarily correlated sources over a multiple access channel. Characterization of the achievable rates in the most general set...
Deniz Gündüz, Elza Erkip
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
14 years 2 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
14 years 1 months ago
Factorial representations to generate arbitrary search distributions
A powerful approach to search is to try to learn a distribution of good solutions (in particular of the dependencies between their variables) and use this distribution as a basis ...
Marc Toussaint