Sciweavers

4764 search results - page 174 / 953
» Applications of Error-Control Coding
Sort
View
DOA
2000
159views more  DOA 2000»
13 years 9 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
CORR
2010
Springer
81views Education» more  CORR 2010»
13 years 8 months ago
On the size of identifying codes in triangle-free graphs
In an undirected graph G = (V, E), a subset C V such that C is a dominating set of G, and each vertex in V is dominated by a distinct subset of vertices from C, is called an iden...
Florent Foucaud, Ralf Klasing, Adrian Kosowski, An...
SAC
2002
ACM
13 years 7 months ago
On optimal temporal locality of stencil codes
Iterative solvers such as the Jacobi and Gauss-Seidel relaxation methods are important, but time-consuming building blocks of many scientific and engineering applications. The per...
Claudia Leopold
PAMI
2007
131views more  PAMI 2007»
13 years 7 months ago
The Gray-Code Filter Kernels
—In this paper, we introduce a family of filter kernels—the Gray-Code Kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of Gray-Code...
Gil Ben-Artzi, Hagit Hel-Or, Yacov Hel-Or
ICASSP
2011
IEEE
12 years 12 months ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov