Sciweavers

940 search results - page 131 / 188
» A Perspective of Generative Reuse
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 9 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
TVLSI
2008
121views more  TVLSI 2008»
13 years 9 months ago
Area-Efficient Arithmetic Expression Evaluation Using Deeply Pipelined Floating-Point Cores
Recently, it has become possible to implement floating-point cores on field-programmable gate arrays (FPGAs) to provide acceleration for the myriad applications that require high-p...
Ronald Scrofano, Ling Zhuo, Viktor K. Prasanna
FGCS
2000
81views more  FGCS 2000»
13 years 9 months ago
Managing the operator ordering problem in parallel databases
This paper focuses on parallel query optimization. We consider the operator problem and introduce a new class of execution strategies called Linear-Oriented Bushy Trees (LBTs). Co...
Harald Kosch
CIKM
2010
Springer
13 years 8 months ago
Towards a provenance framework for sub-image processing for astronomical data
While there has been advances in observational equipment that generate huge high quality images, the processing of these images remains a major bottleneck. We show that provenance...
Johnson Mwebaze, John McFarland, Danny Booxhorn, E...
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 8 months ago
Channels Reallocation In Cognitive Radio Networks Based On DNA Sequence Alignment
Nowadays, It has been shown that spectrum scarcity increased due to tremendous growth of new players in wireless base system by the evolution of the radio communication. Resent su...
Santosh Kumar Singh, Krishna Chandra Roy, Vibhakar...