Sciweavers

2621 search results - page 121 / 525
» Near orders and codes
Sort
View
FGCN
2008
IEEE
153views Communications» more  FGCN 2008»
15 years 11 months ago
Experimental Study on Neuronal Spike Sorting Methods
When recording extracellular neural activity, it is often necessary to distinguish action potentials arising from distinct cells near the electrode tip, a process commonly referre...
Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, ...
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 11 months ago
Graph-Based Detector for BLAST Architecture
Abstract— We propose belief propagation (BP) based detection algorithms for the Bell labs layered space-time (BLAST) architectures. We first develop a full complexity BP algorit...
Jun Hu, Tolga M. Duman
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 11 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
SIGDOC
2006
ACM
15 years 10 months ago
Building bridges: connecting research ethics and computer science
The ethical conduct of research is a cornerstone of modern scientific research. Computer science and the discipline’s technological artifacts touch nearly every aspect of moder...
Thomas L. Honeycutt, David R. Wright
LCPC
2004
Springer
15 years 10 months ago
Experiences in Using Cetus for Source-to-Source Transformations
Cetus is a compiler infrastructure for the source-to-source transformation of programs. Since its creation nearly three years ago, it has grown to over 12,000 lines of Java code, b...
Troy A. Johnson, Sang Ik Lee, Long Fei, Ayon Basum...