Sciweavers

5387 search results - page 932 / 1078
» Generating generic functions
Sort
View
121
Voted
JSA
2007
139views more  JSA 2007»
15 years 2 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
112
Voted
TSP
2008
173views more  TSP 2008»
15 years 2 months ago
Gaussian Mixture Modeling by Exploiting the Mahalanobis Distance
In this paper, the expectation-maximization (EM) algorithm for Gaussian mixture modeling is improved via three statistical tests. The first test is a multivariate normality criteri...
Dimitrios Ververidis, Constantine Kotropoulos
156
Voted
WWW
2008
ACM
15 years 2 months ago
A Novelty-based Clustering Method for On-line Documents
In this paper, we describe a document clustering method called noveltybased document clustering. This method clusters documents based on similarity and novelty. The method assigns...
Sophoin Khy, Yoshiharu Ishikawa, Hiroyuki Kitagawa
COMBINATORICS
2004
90views more  COMBINATORICS 2004»
15 years 2 months ago
Strings with Maximally Many Distinct Subsequences and Substrings
A natural problem in extremal combinatorics is to maximize the number of distinct subsequences for any length-n string over a finite alphabet ; this value grows exponentially, but...
Abraham Flaxman, Aram Wettroth Harrow, Gregory B. ...
179
Voted
CORR
2004
Springer
148views Education» more  CORR 2004»
15 years 2 months ago
Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs
The proliferation of IEEE 802.11-based wireless LANs opens up avenues for creation of several tetherless and mobility oriented services. Most of these services, like voice over WL...
Srikant Sharma, Kartik Gopalan, Ningning Zhu, Gang...