Sciweavers

125 search results - page 17 / 25
» Linear Cryptanalysis Using Multiple Approximations and FEAL
Sort
View
ISBI
2007
IEEE
14 years 1 months ago
Molecular Tomographic Imaging of Lymph Nodes with Nir Fluorescence
This contribution describes a system and method for tomographically imaging lymph nodes marked with a lymph endothelium targeting fluorescence reporter. A novel scanning NIR lase...
Amit Joshi, Wolfgang Bangerth, Ruchi Sharma, John ...
IPPS
2003
IEEE
14 years 27 days ago
On Self-Similarity and Hamiltonicity of Dual-Cubes
The dual-cube is a newly proposed topology for interconnection networks, which uses low dimensional hypercubes as building blocks. The primary advantages of the dual-cube over the...
Changfu Wu, Jie Wu
CISS
2007
IEEE
13 years 11 months ago
Channel-Adaptive Optimal OFDMA Scheduling
Abstract-Joint subcarrier, power and rate allocation in orthogonal frequency division multiple access (OFDMA) scheduling is investigated for both downlink and uplink wireless trans...
Xin Wang, Georgios B. Giannakis, Yingqun Yu
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 13 days ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar
ICFP
2007
ACM
14 years 7 months ago
Relating complexity and precision in control flow analysis
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies ...
David Van Horn, Harry G. Mairson