Sciweavers

85 search results - page 11 / 17
» Spectral Techniques for Expander Codes
Sort
View
ICALP
2000
Springer
14 years 4 days ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
IEEEINTERACT
2003
IEEE
14 years 1 months ago
Procedure Cloning and Integration for Converting Parallelism from Coarse to Fine Grain
This paper introduces a method for improving program run-time performance by gathering work in an application and executing it efficiently in an integrated thread. Our methods ext...
Won So, Alexander G. Dean
DAGSTUHL
2006
13 years 10 months ago
Program Compression
Abstract. The talk focused on a grammar-based technique for identifying redundancy in program code and taking advantage of that redundancy to reduce the memory required to store an...
William S. Evans
BMCBI
2010
138views more  BMCBI 2010»
13 years 8 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
ICASSP
2009
IEEE
14 years 12 days ago
Narrowband interference mitigation in BICM OFDM systems
Orthogonal frequency division multiplexing (OFDM) is noted for its resistance to narrowband interference when equipped with forward error correction. This technique along with era...
Arun Batra, James R. Zeidler