Sciweavers

438 search results - page 25 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 7 months ago
ML(n)BiCGStab: Reformulation, Analysis and Implementation
With the help of index functions, we re-derive the ML(n)BiCGStab algorithm in [35] in a more systematic way. There are n ways to define the ML(n)BiCGStab residual vector. Each diff...
Man-Chung Yeung
CVIU
2008
126views more  CVIU 2008»
13 years 7 months ago
Optimising dynamic graphical models for video content analysis
A key problem in video content analysis using dynamic graphical models is to learn a suitable model structure given some observed visual data. We propose a Completed Likelihood AI...
Tao Xiang, Shaogang Gong
PR
2007
108views more  PR 2007»
13 years 7 months ago
Local anisotropy analysis for non-smooth images
Identification of local anisotropy and determination of principal axes is addressed through different methods that are designed to be tolerant to the non-smooth character of ima...
Sandra Bergonnier, François Hild, Sté...
ICC
2009
IEEE
13 years 5 months ago
Performance Evaluation of QAM-Based BICM: An Analytical Approach
We present an analytical approach to determine the performance of bit-interleaved coded modulation (BICM) transmission over unfaded Gaussian channels. In particular, we derive expr...
Alireza Kenarsari-Anhari, Lutz H.-J. Lampe
INFOCOM
2008
IEEE
14 years 1 months ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu