Sciweavers

810 search results - page 99 / 162
» Rule-based Model Extraction from Source Code
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 7 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
ICMCS
2006
IEEE
136views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Off-Line Motion Description for Fast Video Stream Generation in MPEG-4 AVC/H.264
The rate-distortion optimal mode decision as well as motion estimation adopted in H.264 brings a big challenge to realtime encoding and transcoding duo to the high computation com...
Yi Wang, Xiaoyan Sun, Feng Wu, Shipeng Li, Houqian...
EDOC
2002
IEEE
14 years 27 days ago
Anti-Yacc: MOF-to-Text
The Object Management Group (OMG) is pursuing its new Model-Driven Architecture (MDA) strategy. The Meta-Object Facility (MOF) is an important technology to support the MDA, both ...
David Hearnden, Kerry Raymond, Jim Steel
BMCBI
2005
126views more  BMCBI 2005»
13 years 7 months ago
Integrative analysis of multiple gene expression profiles with quality-adjusted effect size models
Background: With the explosion of microarray studies, an enormous amount of data is being produced. Systematic integration of gene expression data from different sources increases...
Pingzhao Hu, Celia M. T. Greenwood, Joseph Beyene
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 6 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...