Sciweavers

1282 search results - page 220 / 257
» Practical Loss-Resilient Codes
Sort
View
TWC
2008
114views more  TWC 2008»
13 years 8 months ago
Two dimensional cross-layer optimization for packet transmission over fading channel
In this paper a single-input-single-output wireless data transmission system with adaptive modulation and coding over correlated fading channel is considered, where run-time power ...
Xiaofeng Bai, Abdallah Shami
ICSE
2011
IEEE-ACM
13 years 3 days ago
Pragmatic prioritization of software quality assurance efforts
A plethora of recent work leverages historical data to help practitioners better prioritize their software quality assurance efforts. However, the adoption of this prior work in p...
Emad Shihab
ICSE
2011
IEEE-ACM
13 years 3 days ago
Understanding broadcast based peer review on open source software projects
Software peer review has proven to be a successful technique in open source software (OSS) development. In contrast to industry, where reviews are typically assigned to specific ...
Peter C. Rigby, Margaret-Anne D. Storey
NAR
2011
188views Computer Vision» more  NAR 2011»
12 years 11 months ago
The Gene Expression Barcode: leveraging public data repositories to begin cataloging the human and murine transcriptomes
Various databases have harnessed the wealth of publicly available microarray data to address biological questions ranging from across-tissue differential expression to homologous ...
Matthew N. McCall, Karan Uppal, Harris A. Jaffee, ...
SDM
2011
SIAM
242views Data Mining» more  SDM 2011»
12 years 11 months ago
Fast Algorithms for Finding Extremal Sets
Identifying the extremal (minimal and maximal) sets from a collection of sets is an important subproblem in the areas of data-mining and satisfiability checking. For example, ext...
Roberto J. Bayardo, Biswanath Panda