Sciweavers

1279 search results - page 95 / 256
» Fast Implementations of Automata Computations
Sort
View
MSWIM
2005
ACM
14 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
FAST
2011
13 years 1 months ago
FAST: Quick Application Launch on Solid-State Drives
Application launch performance is of great importance to system platform developers and vendors as it greatly affects the degree of users’ satisfaction. The single most effectiv...
Yongsoo Joo, Junhee Ryu, Sangsoo Park, Kang G. Shi...
ICB
2009
Springer
355views Biometrics» more  ICB 2009»
14 years 4 months ago
3D Signatures for Fast 3D Face Recognition
We propose a vector representation (called a 3D signature) for 3D face shape in biometrics applications. Elements of the vector correspond to fixed surface points in a face-centere...
Chris Boehnen, Tanya Peters, Patrick J. Flynn
ISSAC
2007
Springer
146views Mathematics» more  ISSAC 2007»
14 years 4 months ago
Fast and exact geometric analysis of real algebraic plane curves
An algorithm is presented for the geometric analysis of an algebraic curve f(x, y) = 0 in the real affine plane. It computes a cylindrical algebraic decomposition (CAD) of the pla...
Arno Eigenwillig, Michael Kerber, Nicola Wolpert
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
14 years 3 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee