Sciweavers

780 search results - page 135 / 156
» Correctness of Component-Based Adaptation
Sort
View
ICCV
2001
IEEE
14 years 9 months ago
A Novel Modeling Algorithm for Shape Recovery of Unknown Topology
This paper presents a novel modeling algorithm that is capable of simultaneously recovering correct shape geometry as well as its unknown topology from arbitrarily complicated dat...
Ye Duan, Hong Qin
VTC
2007
IEEE
130views Communications» more  VTC 2007»
14 years 2 months ago
Phase Noise Suppression in OFDM with Spatial Multiplexing
— A very promising way to achieve high spectral efficiency in wireless communication is the use of multiple transmit and receive antennas. However, in combination with multicarr...
Steffen Bittner, Wolfgang Rave, Gerhard Fettweis
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 1 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
KBSE
2005
IEEE
14 years 1 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...
POPL
1989
ACM
13 years 11 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott