Sciweavers

18209 search results - page 103 / 3642
» Some Remarks on the Paper
Sort
View
CHES
2007
Springer
115views Cryptology» more  CHES 2007»
14 years 4 months ago
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
This papers introduces several binary scalar multiplication algorithms with applications to cryptography. Remarkably, the proposed algorithms regularly repeat the same pattern when...
Marc Joye
ASPDAC
2006
ACM
104views Hardware» more  ASPDAC 2006»
14 years 4 months ago
Workload prediction and dynamic voltage scaling for MPEG decoding
– In this paper we present three efficient DVS techniques for an MPEG decoder. Their energy reduction is comparable to that of the optimal solution. A workload prediction model i...
Ying Tan, Parth Malani, Qinru Qiu, Qing Wu
HICSS
2005
IEEE
191views Biometrics» more  HICSS 2005»
14 years 3 months ago
Collaboration in Context-Aware Mobile Phone Applications
Context-aware applications are expected to become a remarkable application area within future mobile computing. As mobile phones form a natural tool for interaction between people...
Jonna Häkkilä, Jani Mäntyjärvi
ESA
2004
Springer
137views Algorithms» more  ESA 2004»
14 years 3 months ago
Fast 3-Coloring Triangle-Free Planar Graphs
We show the first o(n2 ) algorithm for coloring vertices of trianglefree planar graphs using three colors. The time complexity of the algorithm is O(n log n). Our approach can be ...
Lukasz Kowalik
SETN
2004
Springer
14 years 3 months ago
Music Performer Verification Based on Learning Ensembles
In this paper the problem of music performer verification is introduced. Given a certain performance of a musical piece and a set of candidate pianists the task is to examine wheth...
Efstathios Stamatatos, Ergina Kavallieratou