Sciweavers

555 search results - page 65 / 111
» Polar codes are optimal for lossy source coding
Sort
View
CSMR
2010
IEEE
13 years 2 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...
ICVS
2001
Springer
14 years 5 days ago
Compiling SA-C Programs to FPGAs: Performance Results
Abstract. At the first ICVS, we presented SA-C (“sassy”), a singleassignment variant of the C programming language designed to exploit both coarse-grain and fine-grain parallel...
Bruce A. Draper, A. P. Wim Böhm, Jeffrey Hamm...
TCSV
2002
114views more  TCSV 2002»
13 years 7 months ago
Multicast and unicast real-time video streaming over wireless LANs
In this paper, we address the problem of real-time video streaming over wireless LANs for both unicast and multicast transmission. The wireless channel is modeled as a packet-erasu...
Abhik Majumdar, Daniel Grobe Sachs, Igor Kozintsev...
PROCEDIA
2010
103views more  PROCEDIA 2010»
13 years 2 months ago
Towards generating optimised finite element solvers for GPUs from high-level specifications
We argue that producing maintainable high-performance implementations of finite element methods for multiple targets requires that they are written using a high-level domain-speci...
Graham R. Markall, David A. Ham, Paul H. J. Kelly
TMM
2011
121views more  TMM 2011»
13 years 2 months ago
Spread Spectrum Visual Sensor Network Resource Management Using an End-to-End Cross-Layer Design
—In this paper, we propose an approach to manage network resources for a direct sequence code division multiple access (DS-CDMA) visual sensor network where nodes monitor scenes ...
Elizabeth S. Bentley, Lisimachos P. Kondi, John D....