Sciweavers

12257 search results - page 238 / 2452
» Analysis of Algorithms
Sort
View
WSC
2007
15 years 4 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
SAC
2005
ACM
15 years 7 months ago
Handwritten character skeletonisation for forensic document analysis
A new method of skeletonisation (stroke extraction) of handwritten character images is presented. The method has been designed to extract the skeleton which is very close to human...
Vladimir Pervouchine, Graham Leedham, Konstantin M...
ESANN
2008
15 years 3 months ago
Generalized matrix learning vector quantizer for the analysis of spectral data
The analysis of spectral data constitutes new challenges for machine learning algorithms due to the functional nature of the data. Special attention is paid to the metric used in t...
Petra Schneider, Frank-Michael Schleif, Thomas Vil...
DEDS
2002
90views more  DEDS 2002»
15 years 1 months ago
Perturbation Analysis for Stochastic Fluid Queueing Systems
Recent study for congestion control in high speed networks indicates that the derivative information for the congestion at the common buffer for multiple sources could be useful i...
Yong Liu, Weibo Gong
POPL
2007
ACM
16 years 2 months ago
Interprocedural analysis of asynchronous programs
An asynchronous program is one that contains procedure calls which are not immediately executed from the callsite, but stored and "dispatched" in a non-deterministic ord...
Ranjit Jhala, Rupak Majumdar