Sciweavers

916 search results - page 16 / 184
» Using redundancies to find errors
Sort
View
BMCBI
2006
119views more  BMCBI 2006»
13 years 10 months ago
Utilization of two sample t-test statistics from redundant probe sets to evaluate different probe set algorithms in GeneChip stu
Background: The choice of probe set algorithms for expression summary in a GeneChip study has a great impact on subsequent gene expression data analysis. Spiked-in cRNAs with know...
Zihua Hu, Gail R. Willsky
ICMCS
1999
IEEE
126views Multimedia» more  ICMCS 1999»
14 years 2 months ago
Error Spreading: Reducing Bursty Errors in Continuous Media Streaming
With the growing popularity of the Internet, there is increasing interest in using it for audio and video transmission. Periodic network overloads, leading to bursty packet losses...
Hung Q. Ngo, Srivatsan Varadarajan, Jaideep Srivas...
VTC
2007
IEEE
108views Communications» more  VTC 2007»
14 years 4 months ago
Joint Optimization of Iterative Source and Channel Decoding Using Over-Complete Source-Mapping
— The intentionally imposed or inherent unintentional residual redundancy found in source encoded bitstreams can be exploited for supporting joint SoftBit-Source Decoding and Cha...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
IPCCC
2006
IEEE
14 years 3 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
VTC
2010
IEEE
176views Communications» more  VTC 2010»
13 years 8 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo