Sciweavers

1512 search results - page 196 / 303
» Principles of IEEE 802.11s
Sort
View
137
Voted
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 10 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
161
Voted
ISCAS
2008
IEEE
114views Hardware» more  ISCAS 2008»
15 years 10 months ago
A novel fine rate control algorithm with adaptive rounding offset
— The rate control algorithm is of essential importance to a video encoder. It enables the encoded bitstream to meet the bandwidth and storage requirement while maintaining good ...
Yali Liu, Xiaoan Lu, Cristina Gomila, Qian Xu
IWPC
2008
IEEE
15 years 10 months ago
Assessing Software Archives with Evolutionary Clusters
The way in which a system’s software archive is partitioned influences the evolvability of that system. The partition of a software archive is mostly assessed by looking at the...
Adam Vanya, Lennart Holland, A. Steven Klusener, P...
KBSE
2008
IEEE
15 years 10 months ago
Exploring the composition of unit test suites
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the ...
Bart Van Rompaey, Serge Demeyer
LCN
2008
IEEE
15 years 10 months ago
Range queries and load balancing in a hierarchically structured P2P system
—Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, a...
Simon Rieche, Bui The Vinh, Klaus Wehrle