Sciweavers

2265 search results - page 137 / 453
» Recovering Exchanged Data
Sort
View
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
15 years 2 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
112
Voted
SIAMJO
2002
100views more  SIAMJO 2002»
15 years 2 months ago
Warm-Start Strategies in Interior-Point Methods for Linear Programming
Abstract. We study the situation in which, having solved a linear program with an interiorpoint method, we are presented with a new problem instance whose data is slightly perturbe...
E. Alper Yildirim, Stephen J. Wright
ICARIS
2010
Springer
15 years 1 months ago
A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems
Abstract. This paper presents a high level dynamic task allocation algorithm that is inspired by the biological development process and the immune system. For a microprocessor (µP...
Yang Liu, Jon Timmis, Omer Qadir, Gianluca Tempest...
113
Voted
IGARSS
2009
15 years 8 days ago
Inversion Algorithm for Estimating Radio Frequency Interference Characteristics based on Kurtosis Measurements
- An inversion algorithm is developed to recover power and duty-cycle of incoming Radio Frequency Interference (RFI) signals from kurtosis. The algorithm applies simulated annealin...
Sidharth Misra, Christopher Ruf
127
Voted
SIGMOD
2004
ACM
174views Database» more  SIGMOD 2004»
16 years 2 months ago
PIPES - A Public Infrastructure for Processing and Exploring Streams
PIPES is a flexible and extensible infrastructure providing fundamental building blocks to implement a data stream management system (DSMS). It is seamlessly integrated into the J...
Bernhard Seeger, Jürgen Krämer