Sciweavers

AES
2005
Springer
82views Cryptology» more  AES 2005»
13 years 11 months ago
Design optimization
Santiago Hernández
AES
2005
Springer
137views Cryptology» more  AES 2005»
13 years 11 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
AES
2005
Springer
105views Cryptology» more  AES 2005»
13 years 11 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera
AES
2005
Springer
81views Cryptology» more  AES 2005»
13 years 11 months ago
Optimum design of an interbody implant for lumbar spine fixation
A new minimally invasive surgical technique for lumbar spine fixation is currently in development. The procedure makes use of an interbody implant that is inserted between two ver...
Andrés Tovar, Shawn E. Gano, James J. Mason...
AES
2006
Springer
106views Cryptology» more  AES 2006»
13 years 11 months ago
A grid-enabled problem solving environment for parallel computational engineering design
This paper describes the development and application of a piece of engineering software that provides a Problem Solving Environment (PSE) capable of launching, and interfacing wit...
C. E. Goodyer, Martin Berzins, Peter K. Jimack, L....
AES
2006
Springer
113views Cryptology» more  AES 2006»
13 years 11 months ago
A classification technique based on radial basis function neural networks
Haralambos Sarimveis, Philip Doganis, Alex Alexand...
AES
2006
Springer
97views Cryptology» more  AES 2006»
13 years 11 months ago
ADSS: An approach to determining semantic similarity
Determining the semantic similarity is an important issue in the development of semantic search technology. In this paper, we propose an approach to determining the semantic simil...
Lixin Han, Linping Sun, Guihai Chen, Li Xie
CORR
2010
Springer
368views Education» more  CORR 2010»
13 years 11 months ago
Quasigroups in cryptology
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Crypto...
V. A. Shcherbacov
AES
2007
Springer
104views Cryptology» more  AES 2007»
13 years 11 months ago
An adaptive mixed finite element method for wind field adjustment
J. M. Cascón, Luis Ferragut