Sciweavers

1607 search results - page 225 / 322
» The existence of k-radius sequences
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
14 years 3 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
CRV
2007
IEEE
137views Robotics» more  CRV 2007»
14 years 3 months ago
Quantitative Evaluation of Feature Extractors for Visual SLAM
We present a performance evaluation framework for visual feature extraction and matching in the visual simultaneous localization and mapping (SLAM) context. Although feature extra...
Jonathan Klippenstein, Hong Zhang
GLVLSI
2007
IEEE
135views VLSI» more  GLVLSI 2007»
14 years 3 months ago
Exact sat-based toffoli network synthesis
Compact realizations of reversible logic functions are of interest in the design of quantum computers. Such reversible functions are realized as a cascade of Toffoli gates. In th...
Daniel Große, Xiaobo Chen, Gerhard W. Dueck,...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
A Frequency Diversity Technique for Interference Mitigation in Coexisting Bluetooth and WLAN
— Co-channel interference has become an important problem with the increasing deployment of wireless networks in the unlicensed frequency band. Most existing schemes aim to avoid...
Jingli Li, Xiangqian Liu