Sciweavers

557 search results - page 93 / 112
» The L4.verified Project - Next Steps
Sort
View
CW
2008
IEEE
14 years 2 months ago
Automatic Surface Scanning of 3D Artifacts
—This paper describes an automatic 3D surface scanning technique using a 3D scanner. It allows the acquisition of a complete surface model of a 3D artifact without any manual reg...
Shiaofen Fang, Basil George, Mathew Palakal
ICPR
2008
IEEE
14 years 2 months ago
Hallucinating facial images and features
In facial image analysis, image resolution is an important factor which has great influence on the performance of face recognition systems. As for lowresolution face recognition p...
Bo Li, Hong Chang, Shiguang Shan, Xilin Chen, Wen ...
ISCAS
2008
IEEE
84views Hardware» more  ISCAS 2008»
14 years 2 months ago
Pulse-based signal compression for implanted neural recording systems
— Today’s implanted neural systems are bound by tight constraints on power and communication bandwidth. Most conventional ADC-based approaches fall into two categories. Either ...
John G. Harris, Jose C. Principe, Justin C. Sanche...
ISCC
2008
IEEE
152views Communications» more  ISCC 2008»
14 years 2 months ago
Efficient delivery of MBMS multicast traffic over HSDPA
Multimedia Broadcast/Multicast Service (MBMS) and High-Speed Downlink Packet Access (HSDPA) are two key technologies that constitute a significant step towards the Mobile Broadban...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
AFRICACRYPT
2008
Springer
14 years 2 months ago
Correlated Keystreams in Moustique
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different...
Emilia Käsper, Vincent Rijmen, Tor E. Bj&osla...