Sciweavers

599 search results - page 107 / 120
» To Feed or Not to Feed Back
Sort
View
SC
2009
ACM
14 years 11 days ago
A framework for core-level modeling and design of reconfigurable computing algorithms
Reconfigurable computing (RC) is rapidly becoming a vital technology for many applications, from high-performance computing to embedded systems. The inherent advantages of custom-...
Gongyu Wang, Greg Stitt, Herman Lam, Alan D. Georg...
UIC
2009
Springer
14 years 7 days ago
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System
The major surveillance camera manufacturers have begun incorporating wireless networking functionality into their products to enable wireless access. However, the video feeds from ...
Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portman...
ERCIMDL
2001
Springer
131views Education» more  ERCIMDL 2001»
14 years 6 days ago
An On-Line Document Clustering Method Based on Forgetting Factors
Abstract. With the rapid development of on-line information services, information technologies for on-line information processing have been receiving much attention recently. Clust...
Yoshiharu Ishikawa, Yibing Chen, Hiroyuki Kitagawa
ICCS
2001
Springer
14 years 5 days ago
Inclusion-Based Approximate Reasoning
Nowadays, people start to accept fuzzy rule–based systems as flexible and convenient tools to solve a myriad of ill–defined but otherwise (for humans) straightforward tasks s...
Chris Cornelis, Etienne E. Kerre
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
14 years 2 days ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux