Sciweavers

384 search results - page 56 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
JRTIP
2008
300views more  JRTIP 2008»
15 years 1 months ago
Real-time human action recognition on an embedded, reconfigurable video processing architecture
Abstract In recent years, automatic human action recognition has been widely researched within the computer vision and image processing communities. Here we propose a realtime, emb...
Hongying Meng, Michael Freeman, Nick Pears, Chris ...
TPDS
2008
97views more  TPDS 2008»
15 years 1 months ago
Solving Systems of Linear Equations on the CELL Processor Using Cholesky Factorization
: The STI CELL processor introduces pioneering solutions in processor architecture. At the same time it presents new challenges for the development of numerical algorithms. One is ...
Jakub Kurzak, Alfredo Buttari, Jack Dongarra
122
Voted
KES
2007
Springer
15 years 1 months ago
An Application of Machine Learning Methods to PM10 Level Medium-Term Prediction
The study described in this paper, analyzed the urban and suburban air pollution principal causes and identified the best subset of features (meteorological data and air pollutants...
Giovanni Raimondo, Alfonso Montuori, Walter Moniac...
PIMRC
2010
IEEE
14 years 11 months ago
Asymptotic analysis of distributed multi-cell beamforming
We consider the problem of multi-cell downlink beamforming with N cells and K terminals per cell. Cooperation among base stations (BSs) has been found to increase the system throug...
Subhash Lakshminaryana, Jakob Hoydis, Mérou...
TCOM
2010
133views more  TCOM 2010»
14 years 8 months ago
Low-complexity decoding for non-binary LDPC codes in high order fields
In this paper, we propose a new implementation of the Extended Min-Sum (EMS) decoder for non-binary LDPC codes. A particularity of the new algorithm is that it takes into accounts...
Adrian Voicila, David Declercq, François Ve...