Sciweavers

933 search results - page 112 / 187
» Robust Distributed Source Coding
Sort
View
ALGOSENSORS
2010
Springer
13 years 9 months ago
MSDR-D Network Localization Algorithm
Abstract. We present a distributed multi-scale dead-reckoning (MSDR-D) algorithm for network localization that utilizes local distance and angular information for nearby sensors. T...
Kevin Coogan, Varun Khare, Stephen G. Kobourov, Ba...
SIGSOFT
2003
ACM
14 years 10 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
TOOLS
2010
IEEE
13 years 7 months ago
Visualizing Dynamic Metrics with Profiling Blueprints
While traditional approaches to code profiling help locate performance bottlenecks, they offer only limited support for removing these bottlenecks. The main reason is the lack of v...
Alexandre Bergel, Romain Robbes, Walter Binder
ICMCS
2006
IEEE
219views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Analysis of Multi-User Congestion Control for Video Streaming Over Wireless Networks
When multiple video sources are live-encoded and transmitted over a common wireless network, each stream needs to adapt its encoding parameters to wireless channel fluctuations, ...
Xiaoqing Zhu, Bernd Girod
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
14 years 4 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao