Sciweavers

3758 search results - page 573 / 752
» A Complete Subsumption Algorithm
Sort
View
ESAS
2004
Springer
15 years 3 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
82
Voted
ICCS
2004
Springer
15 years 3 months ago
Point-Based Modeling from a Single Image
Abstract. The complexity of virtual environments has grown spectacularly over the recent years, mainly thanks to the use of the currently cheap high performance graphics cards. As ...
Pere-Pau Vázquez, Jordi Marco, Mateu Sbert
IJCNLP
2004
Springer
15 years 3 months ago
Phoneme-Based Transliteration of Foreign Names for OOV Problem
One problem seriously affecting CLIR performance is the processing of queries with embedded foreign names. A proper noun dictionary is never complete rendering name translation fr...
Wei Gao, Kam-Fai Wong, Wai Lam
IPSN
2004
Springer
15 years 3 months ago
Naps: scalable, robust topology management in wireless ad hoc networks
Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connec...
Brighten Godfrey, David Ratajczak
107
Voted
ISSAC
2004
Springer
185views Mathematics» more  ISSAC 2004»
15 years 3 months ago
Automatic generation of polynomial loop
In [17], an abstract framework for automatically generating loop invariants of imperative programs was proposed. This framework was then instantiated for the language of conjuncti...
Enric Rodríguez-Carbonell, Deepak Kapur