—In this contribution, duals of fountain codes are introduced and their use for lossy source compression is investigated. It is shown both theoretically and experimentally that t...
Dino Sejdinovic, Robert J. Piechocki, Angela Doufe...
Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
Data races occur when multiple threads are about to access the same piece of memory, and at least one of those accesses is a write. Such races can lead to hard-to-reproduce bugs t...
Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are p...
This paper describes the main ideas of DRMTP (Distributed Real-time Multicast Transport Protocol), an adaptive application-level protocol which allows cooperative multicast of rea...