Sciweavers

7134 search results - page 1270 / 1427
» A comparative study of map use
Sort
View
IACR
2011
82views more  IACR 2011»
12 years 10 months ago
Wild McEliece Incognito
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of se...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
ICC
2011
IEEE
225views Communications» more  ICC 2011»
12 years 10 months ago
Throughput-Optimal Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
Abstract—We study a cooperative communication system consisting of two users in half duplex mode communicating with one destination over additive white Gaussian noise (AWGN). Coo...
Ahmad Abu Al Haija, Mai Vu
CORR
2012
Springer
250views Education» more  CORR 2012»
12 years 6 months ago
Mining Attribute-structure Correlated Patterns in Large Attributed Graphs
In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a task we call structural correlation pattern minin...
Arlei Silva, Wagner Meira Jr., Mohammed J. Zaki
WMCSA
2012
IEEE
12 years 6 months ago
SpinLoc: spin once to know your location
The rapid growth of location-based applications has spurred extensive research on localization. Nonetheless, indoor localization remains an elusive problem mostly because the accu...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
CVPR
2012
IEEE
12 years 24 days ago
The role of image understanding in contour detection
Many cues have been proposed for contour detection or image segmentation. These include low-level image gradients to high-level information such as the identity of the objects in ...
C. Lawrence Zitnick, Devi Parikh
« Prev « First page 1270 / 1427 Last » Next »