Sciweavers

1272 search results - page 79 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
ICDCS
2008
IEEE
14 years 3 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
ACRI
2006
Springer
14 years 3 months ago
Modeling Crowd Behavior Based on Social Comparison Theory: Extended Abstract
on Theory: Extended Abstract Natalie Fridman and Gal Kaminka Bar Ilan University, Israel The MAVERICK Group Computer Science Department {fridman,galk}cs.biu.ac.il Abstract. Modelin...
Natalie Fridman, Gal A. Kaminka
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
A Time Slice Based Scheduler Model for System Level Design
Efficient evaluation of design choices, in terms of selection of algorithms to be implemented as hardware or software, and finding an optimal hw/sw design mix is an important re...
Luciano Lavagno, Claudio Passerone, Vishal Shah, Y...
ICDAR
2003
IEEE
14 years 2 months ago
Fast Lexicon-Based Word Recognition in Noisy Index Card Images
This paper describes a complete system for reading typewritten lexicon words in noisy images - in this case museum index cards. The system is conceptually simple, and straightforw...
Simon M. Lucas, Gregory Patoulas, Andy C. Downton
ISCAS
2002
IEEE
80views Hardware» more  ISCAS 2002»
14 years 2 months ago
Power line communication front-ends based on ADSL technology
The practical implementation of communication over power lines (PLC) using an Asymmetric Digital Subscriber Line (ADSL) front-end is discussed. Both PLC and ADSL modems are based ...
J. Van den Keybus, B. Bolsens, Johan Driesen, Ronn...