Sciweavers

13618 search results - page 2693 / 2724
» The Newton Operating System
Sort
View
JCIT
2008
165views more  JCIT 2008»
13 years 7 months ago
Adaptive Source pixel based Prediction for Lossless Intra Coding of H.264 MPEG-4 /AVC
A new prediction for lossless intra coding technique employs source pixel based prediction in contrast to source block based prediction is presented as an enhancement of H.264/MPE...
N. Krishnan, P. Vijayalakshmi, R. K. Selvakumar, S...
CPHYSICS
2007
222views more  CPHYSICS 2007»
13 years 7 months ago
JADAMILU: a software code for computing selected eigenvalues of large sparse symmetric matrices
A new software code for computing selected eigenvalues and associated eigenvectors of a real symmetric matrix is described. The eigenvalues are either the smallest or those closes...
Matthias Bollhöfer, Yvan Notay
JNW
2008
77views more  JNW 2008»
13 years 7 months ago
Datacasting In The Mobile Environment
Datacasting employs the excess bandwidth from digital television signals for use in one-way data transmission, and it is being used successfully for high-speed downloads at fixed l...
Kent Chamberlin, Benjamin McMahon, Scott Valcourt
JSAC
2008
151views more  JSAC 2008»
13 years 7 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
« Prev « First page 2693 / 2724 Last » Next »