Sciweavers

33 search results - page 5 / 7
» A Simple Key Distribution Method for IEEE 802.11 Encryption ...
Sort
View
ICPR
2010
IEEE
13 years 3 months ago
Wavelet Domain Local Binary Pattern Features For Writer Identification
The representation of writing styles is a crucial step of writer identification schemes. However, the large intra-writer variance makes it a challenging task. Thus, a good feature...
Liang Du, Xinge You, Huihui Xu, Zhifan Gao, Yuan Y...
ISPASS
2010
IEEE
14 years 4 days ago
Performance-effective operation below Vcc-min
Continuous circuit miniaturization and increased process variability point to a future with diminishing returns from dynamic voltage scaling. Operation below Vcc-min has been prop...
Nikolas Ladas, Yiannakis Sazeides, Veerle Desmet
ICCV
2007
IEEE
14 years 7 months ago
Correspondence Establishment in Statistical Modeling of Shapes with Arbitrary Topology
Correspondence establishment is a key step in statistical shape model building. There are several automated methods for solving this problem in 3D, but they usually can only handl...
Ekaterina Syrkina, Gábor Székely, Mi...
COMPSAC
2003
IEEE
13 years 10 months ago
An Object-Passing Model for Parallel Programming
This paper introduces an object-passing model for parallel and distributed application development. Object passing provides the object-oriented application developer with powerful...
Jameela Al-Jaroodi, Nader Mohamed
GRC
2008
IEEE
13 years 6 months ago
Effects of Varying the Delay Distribution in Random, Scale-free, and Small-world Networks
Graph-theory-based approaches have been used with great success when analyzing abstract properties of natural and artificial networks. However, these approaches have not factored...
Bum Soon Jang, Timothy Mann, Yoonsuck Choe