Sciweavers

396 search results - page 24 / 80
» The missing Wendland functions
Sort
View
TIP
1998
114views more  TIP 1998»
13 years 8 months ago
An optimal polygonal boundary encoding scheme in the rate distortion sense
—In this paper, we present fast and efficient methods for the lossy encoding of object boundaries that are given as eight-connect chain codes. We approximate the boundary by a p...
Guido M. Schuster, Aggelos K. Katsaggelos
JOT
2010
144views more  JOT 2010»
13 years 7 months ago
REquirements, Aspects and Software Quality: the REASQ model
Object-oriented analysis and design have been more concerned with system functionality, neglecting non-functional aspects; the result is code which is tangled and difficult to main...
Isi Castillo, Francisca Losavio, Alfredo Matteo, J...
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 7 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
WCNC
2010
IEEE
13 years 7 months ago
Impact of Secondary Users' Field Size on Spectrum Sharing Opportunities
— Previous works studied the effect of many system parameters on spectrum sharing opportunities where secondary users access the spectrum of primary users. However, a parameter t...
Muhammad Aljuaid, Halim Yanikomeroglu
WCNC
2010
IEEE
13 years 7 months ago
End-To-End HARQ in Cognitive Radio Networks
Abstract—Cognitive radio networks (CRN) may greatly enhance the throughput based on a given bandwidth. CRN has a unique feature, consisting of uni-directional opportunistic wirel...
Weng-Chon Ao, Kwang-Cheng Chen