Sciweavers

7921 search results - page 33 / 1585
» LSH-preserving functions and their applications
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Bio-inspired cooperative optimization with application to bacteria motility
Inspired by bacterial motility, we propose an algorithm for adaptation over networks with mobile nodes. The nodes have limited abilities and they are allowed to cooperate with the...
Jianshu Chen, Ali H. Sayed
DAC
2009
ACM
14 years 11 months ago
Non-intrusive dynamic application profiling for multitasked applications
Application profiling ? the process of monitoring an application to determine the frequency of execution within specific regions ? is an essential step within the design process f...
Karthik Shankar, Roman L. Lysecky
ISCAS
2002
IEEE
116views Hardware» more  ISCAS 2002»
14 years 2 months ago
Antisymmetries in the realization of Boolean functions
New symmetries of degree two are introduced, along with spectral techniques for identifying these symmetries. Some applications of these symmetries are discussed, in particular th...
Jacqueline E. Rice, Jon C. Muzio
IJIPT
2007
110views more  IJIPT 2007»
13 years 9 months ago
Towards an application framework for context-aware m-health applications
— Several social issues, like aging, stimulate the use of mobile ICT applications for mobile healthcare (e.g., telemonitoring). To support novel m-health applications, the conseq...
Tom Broens, Aart van Halteren, Marten van Sinderen...
CCS
2008
ACM
13 years 12 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...