Sciweavers

1940 search results - page 364 / 388
» Graph Transformation with Variables
Sort
View
HIPEAC
2009
Springer
15 years 9 months ago
Hybrid Super/Subthreshold Design of a Low Power Scalable-Throughput FFT Architecture
In this article, we present a parallel implementation of a 1024 point Fast Fourier Transform (FFT) operating with a subthreshold supply voltage, which is below the voltage that tur...
Michael B. Henry, Leyla Nazhandali
126
Voted
DSN
2009
IEEE
15 years 9 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang
ICDAR
2009
IEEE
15 years 9 months ago
Text Lines and Snippets Extraction for 19th Century Handwriting Documents Layout Analysis
In this paper we propose a new approach to improve electronic editions of human science corpus, providing an efficient estimation of manuscripts pages structure. In any handwriti...
Vincent Malleron, Véronique Eglin, Hubert E...
ADMA
2009
Springer
212views Data Mining» more  ADMA 2009»
15 years 9 months ago
Automating Gene Expression Annotation for Mouse Embryo
It is of high biomedical interest to identify gene interactions and networks that are associated with developmental and physiological functions in the mouse embryo. There are now v...
Liangxiu Han, Jano I. van Hemert, Richard A. Baldo...
112
Voted
IFIP
2009
Springer
15 years 9 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi