Sciweavers

517 search results - page 93 / 104
» Bit Encryption Is Complete
Sort
View
ISSA
2008
13 years 9 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
NIPS
2004
13 years 9 months ago
Methods Towards Invasive Human Brain Computer Interfaces
During the last ten years there has been growing interest in the development of Brain Computer Interfaces (BCIs). The field has mainly been driven by the needs of completely paral...
Thomas Navin Lal, Thilo Hinterberger, Guido Widman...
MASCOTS
1998
13 years 9 months ago
Performance Analysis of Cellular Mobile Communication Networks Supporting Multimedia Services
This paper illustrates the development of an approximate analytical model for a communication network providing integrated services to a population of mobile users, and presents p...
Marco Ajmone Marsan, Salvatore Marano, Carlo Mastr...
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 8 months ago
Color Image Compression Based On Wavelet Packet Best Tree
In Image Compression, the researchers' aim is to reduce the number of bits required to represent an image by removing the spatial and spectral redundancies. Recently discrete...
Gajanan K. Kharate, Varsha H. Patil
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 8 months ago
Continuation-Passing C, compiling threads to events through continuations
Abstract In this paper, we introduce Continuation Passing C (CPC), a programming language for concurrent systems in which native and cooperative threads are unified and presented t...
Gabriel Kerneis, Juliusz Chroboczek