Sciweavers

384 search results - page 63 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
PADS
2003
ACM
15 years 5 months ago
Enabling Large-Scale Multicast Simulation by Reducing Memory Requirements
The simulation of large–scale multicast networks often requires a significant amount of memory that can easily exceed the capacity of current computers, both because of the inh...
Donghua Xu, George F. Riley, Mostafa H. Ammar, Ric...
ISMIR
2001
Springer
108views Music» more  ISMIR 2001»
15 years 4 months ago
Towards a Cognitive Model of Melodic Similarity
In recent years the interest in melodic similarity has mushroomed mainly due to the increased importance of music information retrieval (MIR). A great number of similarity models ...
Ludger Hofmann-Engl
ATS
2000
IEEE
98views Hardware» more  ATS 2000»
15 years 4 months ago
Embedded core testing using genetic algorithms
Testing of embedded cores is very difficult in SOC (system-on-a-chip), since the core user may not know the gate level implementation of the core, and the controllability and obse...
Ruofan Xu, Michael S. Hsiao
CODES
2000
IEEE
15 years 4 months ago
Co-design of interleaved memory systems
Memory interleaving is a cost-efficient approach to increase bandwidth. Improving data access locality and reducing memory access conflicts are two important aspects to achieve hi...
Hua Lin, Wayne Wolf
ACIVS
2007
Springer
15 years 3 months ago
Patch-Based Experiments with Object Classification in Video Surveillance
We present a patch-based algorithm for the purpose of object classification in video surveillance. Within detected regions-of-interest (ROIs) of moving objects in the scene, a feat...
Rob G. J. Wijnhoven, Peter H. N. de With