Sciweavers

ITNG
2007
IEEE
14 years 5 months ago
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates
This contribution proposes a modification of method of divisors group operation in the Jacobian of hyperelliptic curve over even and odd characteristic fields in projective coordi...
Thomas Wollinger, Vladyslav Kovtun
ITNG
2007
IEEE
14 years 5 months ago
SERT: Software Tool for Generating Student Engagement Reports
Drawing on our previous work on survey and reporting tools that compare faculty expectations with what students report experiencing in class, this paper presents details of a new ...
Judith Ann Ouimet, Sermsak Buntha, Sergiu M. Dasca...
ITNG
2007
IEEE
14 years 5 months ago
Research Documentation Guidelines - Capturing knowledge, improving research
This paper introduced coding guidelines for use by academics developing code as part of their research in areas of computer science or similar disciplines. We introduce the guidel...
Andre Oboler, Ian Sommerville
ITNG
2007
IEEE
14 years 5 months ago
A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and Architecture
Requirement analysis is an important process in the design and development of information systems. Various tools and methodologies are used to gather the user requirements. These ...
Jawed I. A. Siddiqi, Babak Akhgar, Nazaraf Shah, F...
ITNG
2007
IEEE
14 years 5 months ago
Hypergraphs for Near-lossless Volumetric Compression
A hypergraphs-based image representation is already used for 2D lossless image compression. In this paper we extend this hypergraph representation on 3D-image and we add an α-tol...
Luc Gillibert, Alain Bretto
ITNG
2007
IEEE
14 years 5 months ago
Computational Power of the Quantum Turing Automata
Lots of efforts in the last decades have been done to prove or disprove whether the set of polynomially bounded problems is equal to the set of polynomially verifiable problems. T...
Sina Jafarpour, Mohammad Ghodsi, Keyvan Sadri, Zuh...
ITNG
2007
IEEE
14 years 5 months ago
Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals
This paper presents the recognition of Handwritten Hindi Numerals based on the modified exponential membership function fitted to the fuzzy sets derived from normalized distance f...
Madasu Hanmandlu, J. Grover, Vamsi Krishna Madasu,...
ITNG
2007
IEEE
14 years 5 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal
ITNG
2007
IEEE
14 years 5 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan