Sciweavers

71 search results - page 8 / 15
» esas 2004
Sort
View
ESA
2004
Springer
92views Algorithms» more  ESA 2004»
14 years 3 days ago
Finding Dominators in Practice
The computation of dominators in a flowgraph has applications in several areas, including program optimization, circuit testing, and theoretical biology. Lengauer and Tarjan [30]...
Loukas Georgiadis, Renato Fonseca F. Werneck, Robe...
ICPR
2004
IEEE
14 years 7 months ago
Convexity Recognition Using Multi-Scale Autoconvolution
This paper introduces a novel measure for object convexity using the recently introduced Multi-Scale Autoconvolution transform. The proposed measure is computationally efficient a...
Esa Rahtu, Mikko Salo, Janne Heikkilä
CIVR
2004
Springer
118views Image Analysis» more  CIVR 2004»
14 years 3 days ago
Task-Based User Evaluation of Content-Based Image Database Browsing Systems
Abstract. This paper presents a task-based user evaluation of two contentbased image database browsing systems. The performance of the two systems is compared to that of a commerci...
Timo Ojala, Markus Koskela, Esa Matinmikko, Mika R...
ESAS
2004
Springer
14 years 3 days ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
ESAS
2004
Springer
14 years 3 days ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk