Sciweavers

9739 search results - page 1936 / 1948
» Object-Oriented Analysis and Design
Sort
View
IJNSEC
2011
145views more  IJNSEC 2011»
13 years 2 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
JAMIA
2011
94views more  JAMIA 2011»
13 years 2 months ago
Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an
The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practi...
Kenneth W. Goodman, Eta S. Berner, Mark A. Dente, ...
TEDU
2011
243views Education» more  TEDU 2011»
13 years 2 months ago
Sketch Based 3D Character Deformation
Most 3D character editing tools are complex and non-intuitive. It takes lot of skill and labor from the artists to create even a draft 3D humanoid model. This paper proposes an int...
Mo Li, Golam Ashraf
TKDE
2011
528views more  TKDE 2011»
13 years 2 months ago
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
—The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism. The utility of these systems can be greatly en...
Lakshmish Ramaswamy, Jianxia Chen
TSP
2011
170views more  TSP 2011»
13 years 2 months ago
Low-Delay Prediction- and Transform-Based Wyner-Ziv Coding
—This paper studies low-delay Wyner–Ziv coding, i.e., lossy source coding with side information at the decoder, with emphasis on the extreme of zero delay. To achieve zero dela...
Xuechen Chen, Ertem Tuncel
« Prev « First page 1936 / 1948 Last » Next »