Sciweavers

3082 search results - page 605 / 617
» New Bounds for the Controller Problem
Sort
View
125
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
129
Voted
ICC
2000
IEEE
123views Communications» more  ICC 2000»
15 years 8 months ago
Design of Adaptive Bit Interleaved TCM for Rayleigh Fading Channels
fixed rate coding in terms of SNR and average throughput was obtained. In fact, the concept of variable rate adaptive In this paper, we propose a bandwidth efficient error cor- cod...
Vincent K. N. Lau
128
Voted
VISUALIZATION
2000
IEEE
15 years 8 months ago
Extracting regions of interest applying a local watershed transformation
In this paper, we present a new technique for extracting regions of interest (ROI) applying a local watershed transformation. The proposed strategy for computing catchment basins ...
Stanislav L. Stoev, Wolfgang Straßer
134
Voted
CHI
1999
ACM
15 years 8 months ago
Whisper: A Wristwatch Style Wearable Handset
“Whisper” is a new wrist-worn handset, which is used by inserting the fingertip into the ear canal. A received signal is conveyed from a wrist-mounted actuator to the ear cana...
Masaaki Fukumoto, Yoshinobu Tonomura
133
Voted
ICFP
1999
ACM
15 years 8 months ago
Type Inference Builds a Short Cut to Deforestation
Deforestation optimises a functional program by transforming it into another one that does not create certain intermediate data structures. Short cut deforestation is a deforestat...
Olaf Chitil