Sciweavers

3740 search results - page 636 / 748
» A Fast Skeletonization Method
Sort
View
CIT
2006
Springer
14 years 1 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
14 years 1 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
ESORICS
2006
Springer
14 years 1 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
ASYNC
2001
IEEE
136views Hardware» more  ASYNC 2001»
14 years 1 months ago
Efficient Exact Two-Level Hazard-Free Logic Minimization
This paper presents a new approach to two-level hazardfree sum-of-products logic minimization. No currently available minimizers for single-output literal-exact two-level hazard-f...
Chris J. Myers, Hans M. Jacobson
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
14 years 1 months ago
Robust Face Detection Using the Hausdorff Distance
Abstract. The localization of human faces in digital images is a fundamental step in the process of face recognition. This paper presents a shape comparison approach to achieve fas...
Oliver Jesorsky, Klaus J. Kirchberg, Robert Frisch...