Sciweavers

503 search results - page 12 / 101
» If not now, when
Sort
View
DCC
2008
IEEE
14 years 10 months ago
On the second weight of generalized Reed-Muller codes
: Not much is known about the weight distribution of the generalized Reed-Muller code RMq(s, m) when q > 2, s > 2 and m 2 . Even the second weight is only known for values o...
Olav Geil
DCC
2007
IEEE
14 years 10 months ago
Bit Recycling with Prefix Codes
Many data compression methods cannot remove all redundancy from a file that they compress because it can be encoded to many compressed files. In particular, we consider the redund...
Danny Dubé, Vincent Beaudoin
ALT
2008
Springer
14 years 7 months ago
Exploiting Cluster-Structure to Predict the Labeling of a Graph
Abstract. The nearest neighbor and the perceptron algorithms are intuitively motivated by the aims to exploit the “cluster” and “linear separation” structure of the data to...
Mark Herbster
CHI
2010
ACM
14 years 5 months ago
Pico-ing into the future of mobile projector phones
Ten years ago we were on the verge of having cameras built into our mobile phones, but knew very little about what to expect or how they would be used. Now we are faced with the s...
Max L. Wilson, Simon Robinson, Dan Craggs, Kristia...
IEEEARES
2007
IEEE
14 years 4 months ago
AProSec: an Aspect for Programming Secure Web Applications
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...