Sciweavers

2351 search results - page 161 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
ICPP
2008
IEEE
15 years 11 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
WCNC
2008
IEEE
15 years 11 months ago
Analysis of Interference from Large Clusters as Modeled by the Sum of Many Correlated Lognormals
Abstract—We examine the statistical distribution of the interference produced by a cluster of very many co-channel interferers, e.g., a sensor network, or a city full of active w...
Sebastian S. Szyszkowicz, Halim Yanikomeroglu
ICMCS
2007
IEEE
122views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Generating Video Sequence from Photo Image for Mobile Screens by Content Analysis
To bridge the gap between the high resolution digital images and limited display capability of mobile devices, this paper proposes a method to automatically transform static image...
Shuqiang Jiang, Huiying Liu, Zhao Zhao, Qingming H...
IRI
2006
IEEE
15 years 10 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
15 years 10 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica