Sciweavers

20573 search results - page 3999 / 4115
» The Computer's New Clothes
Sort
View
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
14 years 2 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
EMSOFT
2009
Springer
14 years 2 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
ICB
2007
Springer
183views Biometrics» more  ICB 2007»
14 years 2 months ago
Robust Point-Based Feature Fingerprint Segmentation Algorithm
Abstract. A critical step in automatic fingerprint recognition is the accurate segmentation of fingerprint images. The objective of fingerprint segmentation is to decide which part...
Chaohong Wu, Sergey Tulyakov, Venu Govindaraju
GLOBECOM
2009
IEEE
14 years 2 months ago
Coexistence Problem in IEEE 802.22 Wireless Regional Area Networks
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sen...
Raed T. Al-Zubi, Mohammad Z. Siam, Marwan Krunz
« Prev « First page 3999 / 4115 Last » Next »