Sciweavers

117 search results - page 22 / 24
» On the power of quantum fingerprinting
Sort
View
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 10 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
TPDS
2010
134views more  TPDS 2010»
13 years 3 months ago
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs
Null data frames are a special but important type of frames in IEEE 802.11 WLANs. They are widely used in 802.11 WLANs for control purposes such as power management, channel scanni...
Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, Can...
COCO
2008
Springer
97views Algorithms» more  COCO 2008»
13 years 10 months ago
Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems
A central question in quantum information theory and computational complexity is how powerful nonlocal strategies are in cooperative games with imperfect information, such as mult...
Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xi...
ICCAD
2003
IEEE
152views Hardware» more  ICCAD 2003»
14 years 5 months ago
Fredkin/Toffoli Templates for Reversible Logic Synthesis
Reversible logic has applications in quantum computing, low power CMOS, nanotechnology, optical computing, and DNA computing. The most common reversible gates are the Toffoli gate...
Dmitri Maslov, Gerhard W. Dueck, D. Michael Miller
DNA
2004
Springer
14 years 1 months ago
DNA-Based Computation Times
Abstract. Speed of computation and power consumption are the two main parameters of conventional computing devices implemented in microelectronic circuits. As performance of such d...
Yuliy M. Baryshnikov, Edward G. Coffman Jr., Petar...