Sciweavers

384 search results - page 19 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
97
Voted
SGP
2007
15 years 4 months ago
Elastic secondary deformations by vector field integration
We present an approach for elastic secondary deformations of shapes described as triangular meshes. The deformations are steered by the simulation of a low number of simple mass-s...
Wolfram von Funck, Holger Theisel, Hans-Peter Seid...
111
Voted
CASES
2009
ACM
15 years 8 months ago
Fine-grain performance scaling of soft vector processors
Embedded systems are often implemented on FPGA devices and 25% of the time [2] include a soft processor— a processor built using the FPGA reprogrammable fabric. Because of their...
Peter Yiannacouras, J. Gregory Steffan, Jonathan R...
135
Voted
AUSAI
2008
Springer
15 years 3 months ago
Character Recognition Using Hierarchical Vector Quantization and Temporal Pooling
In recent years, there has been a cross-fertilization of ideas between computational neuroscience models of the operation of the neocortex and artificial intelligence models of mac...
John Thornton, Jolon Faichney, Michael Blumenstein...
GFKL
2007
Springer
163views Data Mining» more  GFKL 2007»
15 years 5 months ago
Fast Support Vector Machine Classification of Very Large Datasets
In many classification applications, Support Vector Machines (SVMs) have proven to be highly performing and easy to handle classifiers with very good generalization abilities. Howe...
Janis Fehr, Karina Zapien Arreola, Hans Burkhardt
JGS
2010
106views more  JGS 2010»
14 years 8 months ago
On vector autoregressive modeling in space and time
Despite the fact that it provides a potentially useful analytical tool, allowing for the joint modeling of dynamic interdependencies within a group of connected areas, until latel...
Valter Di Giacinto