نتایج جستجو برای: intermediate codes

تعداد نتایج: 207487  

Journal: :CoRR 2012
Nikolaos Thomos Rethnakaran Pulikkoonattu Pascal Frossard

Growth codes are a subclass of Rateless codes that have found interesting applications in data dissemination problems. Compared to other Rateless and conventional channel codes, Growth codes show improved intermediate performance which is particularly useful in applications where performance increases with the number of decoded data units. In this paper, we provide a generic analytical framewor...

Journal: :J. Prog. Lang. 1996
Cristina Cifuentes

Traditional compiler data ow analysis techniques are used to transform the intermediate representation of a decompiled program to a higher representation that eliminates low-level concepts such as registers and condition codes, and reintroduces the high-level concept of expression. Summary data ow information is collected on condition codes and registers, and is propagated across basic blocks a...

Journal: :transactions on combinatorics 2013
mohammad gholami mehdi samadieh

in this paper, we consider a class of column-weight two quasi-cyclic low-density paritycheck codes in which the girth can be large enough, as an arbitrary multiple of 8. then we devote a convolutional form to these codes, such that their generator matrix can be obtained by elementary row and column operations on the parity-check matrix. finally, we show that the free distance of the convolution...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده برق و کامپیوتر 1390

one of the most important goals for increasing recognition and treatment revenue is transmitting vital data to medical care team, more quickly. nowadays, use of new technologies for transmitting data will deploy more and more daily. in this article, for transmitting electrocardiogram, first we code the signal into a suite of codes, then we will use bluetooth technology to transmit data from off...

Journal: :CoRR 2003
Praveen Sivadasan P. Sojan Lal

Information security is protecting information from unauthorized access, use, disclosure, disruption, modification, perusal and destruction. CAIN model suggest maintaining the Confidentiality, Authenticity, Integrity and Non-repudiation (CAIN) of information. Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer fri...

In the field of Arabic sociolinguistics, diglossia has been an interesting linguistic inquiry since it was first discussed by Ferguson in 1959. Since then, diglossia has been discussed, expanded, and revisited by Badawi (1973), Hudson (2002), and Albirini (2016) among others. While the discussion of the Arabic diglossic situation highlights the existence of two separate codes (High and Lo...

Journal: :IEEE Trans. Information Theory 1984
John G. Cleary Ian H. Witten

The problem of noiselessly encoding a message when prior statistics are known is considered. The close relationship of arithmetic and enumerative coding for this problem is shown by computing explicit arithmetic coding probabilities for various enumerative coding examples. This enables a comparison to be made of the coding efficiency of Markov models and enumerative codes as well as a new codin...

2013
Jutharat Kulsantiwong Sattrachai Prasopdee Jiraporn Ruangsittichai Wipaporn Ruangjirachuporn Thidarut Boonmars Vithoon Viyanant Paola Pierossi Paul D. N. Hebert Smarn Tesana

Freshwater snails in the family Bithyniidae are the first intermediate host for Southeast Asian liver fluke (Opisthorchis viverrini), the causative agent of opisthorchiasis. Unfortunately, the subtle morphological characters that differentiate species in this group are not easily discerned by non-specialists. This is a serious matter because the identification of bithyniid species is a fundamen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید