The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fountain codes are used in many applications where the channels are time varying and it is difficult at the transmitter to predict the appropriate code rate. In this situation, fixedrate codes are not suitable. Despite the good performance of fountain codes, universally optimal codes do not exist in the finite-length regime. In this paper, we design new fountain codes that are robust to the communication...
We analyze the performance of a concatenated code with two different inner decoding schemes. One is the error-detecting inner decoding, and the other is the error-detecting-and-correcting inner decoding scheme. We compare the performances of the two decoding schemes when the concatenated code is applied to slow frequency-hopping spread-spectrum multiple access (FH-SSMA) communication systems.
This paper presents an algorithm that achieves high quality video compression with low memory bandwidth of reference frame data and latency due to computation in motion estimation for screen content. Efficiency is attained by content-adaptive placement of the search windows within the reference frames. In our scheme, the center location of the search window is decided by k most prominent motion vectors...
Many large-scale distributed storage systems deploy erasure coding to protect data from frequent server failures for cost reason. In most of these systems, newly inserted data is first replicated across different storage servers and then migrated to erasure coded. Although this offline encoding manner can improve data access before data is erasure coded for some storage systems, it helps little and...
We present a technique based on permutations, the well known arcade game Pacman, and limited-precision integers to encode data into balanced codewords. The redundancy that is introduced by the encoding is particularly low. The results are noticeably better than those of previous work. Still, the resources required by our technique remain modest: there is no need for costly calculations using large...
Tree-based RFID identification adopts a binary-tree structure to collect IDs of an unknown set. Tag IDs locate at the leaf nodes and the reader queries through intermediate tree nodes and converges to these IDs using feedbacks from tag responses. Existing works cannot function well under random ID distribution as they ignore the distribution information hidden in the physical-layer signal of colliding...
Distributed storage systems are known to be susceptible to long tails in response time. It has been shown that in modern online applications such as Bing, Facebook, and Amazon, the long tail of latency is of particular concern, with 99.9th percentile response times being orders of magnitude worse than the mean. As erasure codes emerge as a popular technique in distributed storage to achieve high data...
In this paper are offered vector-branching diagrams for modeling the TIF processes. Analyzed properties and disadvantages of TIF methods that make it impossible to use certain methods. To solve these problems invited using of subtractive-additive TIF method. Proved effectiveness of their application, by comparing the TIF methods, and the coefficient of efficiency for different bits capacity.
Distributed Storage Systems (DSS) have seen increasing levels of deployment in data centers and in cloud storage provider networks. They provide efficient and cost-effective ways to store large amounts of data and ensure resilience to failures by using mirroring and coding schemes at the block and file level. While mirroring techniques provide an efficient way to recover lost data, they require excess...
Context: Conducting a Grounded Theory study is rigorous, demanding, and challenging. Misperceptions exist within the software engineering community. Objective: The purpose of this paper is to describe one extended participant observation Grounded Theory study for aiding new empirical researchers wanting to run similar research studies. Method: Following Constructivist Grounded Theory, we conducted...
Autoencoder is an excellent unsupervised learning algorithm. However, it can not generate kinds of sample data in the decoding process. Variational autoencoder is a typical generative adversarial net which can generate various data to augment the sample data. In this paper, we want to do some research about the information learning in hidden layer. In the simulation, we compare the hidden layer learning...
With the aim of identifying good structures and examples for papers in the software engineering field, we conducted a study of the type of papers accepted along four decades in the Research Track of the International Conference on Software Engineering (ICSE). We used for this purpose a categorization scheme for Software Engineering papers that was obtained by merging, extending and revising a few...
In this paper, a new family of one-dimensional (1-D) spreading codes is proposed and constructed by utilizing a one-to-one correspondence algorithm, which can convert the existing two-dimensional (2-D) codes into 1-D codes systematically. The coding method not only improves the encoding efficiency and complexity but also lessens the disadvantage of not generating 1-D spreading codes easily. In addition...
Pedestrian detection is an important topic in many applications, such as intelligent transportation systems (ITSs) or surveillance. For the purpose of applications used around the clock, the work for detecting pedestrian based on thermal sensors has attracted significant attention. To achieve this, this paper proposes a LBP (local binary pattern) encoded multi-level classifier for detecting pedestrians...
Recent research in software engineering supports the "happy-productive" thesis, and the desire of flourishing happiness among programmers is often expressed by industry practitioners. Recent literature has suggested that a cost-effective way to foster happiness and productivity among workers could be to limit unhappiness of developers due to its negative impact. However, possible negative...
Signed binary multiplication is the essential part of all digital processing needs. The digital processing is inseparable part in microprocessor, microcontroller, digital image processing, data manipulation, etc. In this paper, a method to generate the partial products which are generated in the multiplication process is being proposed, in order to reduce the computational efforts in the multiplication...
We present a formal probabilistic framework for process learning to compose service specific overlays (SSO) in cloud networks. The approach provides a learning mechanism that relies on previous composition results to build service composition process models that can be adopted for future composition requests. The process is then translated into a workflow-net to provide guaranteed delivery of requested...
In this work, we propose Bit Vectors (BV), an accurate, distance-preserving encoding scheme for representing numerical data values in privacy-preserving tasks. Although many methods have been proposed in the literature for encoding strings, the problem of encoding numerical values has not been effectively addressed yet. In Privacy-Preserving Record Linkage (PPRL), a number of data custodians encode...
The energy consumption of software is an increasing concern as the use of mobile applications, embedded systems, and data center-based services expands. While research in green software engineering is correspondingly increasing, little is known about the current practices and perspectives of software engineers in the field. This paper describes the first empirical study of how practitioners think...
Human being normally uses natural language in form of written or spoken in their daily life. It is an entirely concept based on Artificial Intelligence, Computer Science and Linguistic resources. In Indian languages, Gujarati is an Indo — Aryan language with rich and high inflection. In these languages, several words have common root that's need to be reduced by using stemmer. Stemmer is used to reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.