Sciweavers

473 search results - page 20 / 95
» Computing excluded minors
Sort
View
DATE
2010
IEEE
174views Hardware» more  DATE 2010»
13 years 5 months ago
An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusio
The H.264/AVC video encoder standard significantly improves the compression efficiency by using variable block-sized Inter (P) and Intra (I) Macroblock (MB) coding modes. In this p...
Muhammad Shafique, Bastian Molkenthin, Jörg H...
ACE
2004
175views Education» more  ACE 2004»
13 years 8 months ago
New Arrival Students: Mitigating Factors on the Culture of the Computing Learning Environment
Over the past decade Australian and New Zealand educational institutions have experienced a rapid increase in the numbers of "New Arrivals" - immigrant and international...
Barbara J. Crump
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
RECOMB
2004
Springer
14 years 7 months ago
Chromosomal breakpoint re-use in the inference of genome sequence rearrangement
In order to apply gene-order rearrangement algorithms to the comparison of genome sequences, Pevzner and Tesler [9] bypass gene finding and ortholog identification, and use the or...
David Sankoff, Phil Trinh
DASC
2006
IEEE
14 years 1 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu