Sciweavers

2625 search results - page 88 / 525
» Applications 2000
Sort
View
ACSAC
2000
IEEE
15 years 8 months ago
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip
The performance of RSA hardware is primarily determined by an efficient implementation of the long integer modular arithmetic and the ability to utilize the Chinese Remainder The...
Johann Großschädl
121
Voted
ICMCS
2000
IEEE
112views Multimedia» more  ICMCS 2000»
15 years 8 months ago
Short-Time Kurtosis of Speech Signals with Application to Co-channel Speech Separation
Recent work into the separation of mixtures of speech signals has shown some success. One particular method is based on the assumption that scalar mixtures of speech signals have ...
Phillip L. De Leon
ICPP
2000
IEEE
15 years 8 months ago
Domination and Its Applications in Ad Hoc Wireless Networks with Unidirectional Links
We consider an efficient distributed algorithm for determining a dominating and absorbant set of vertices (mobile hosts) in a given directed graph that represents an ad hoc wirel...
Jie Wu, Hailan Li
114
Voted
MSS
2000
IEEE
89views Hardware» more  MSS 2000»
15 years 8 months ago
Access Coordination of Tertiary Storage for High Energy Physics Applications
We describe a real implementation of a software component that manages caching of files from a tertiary storage management system to a large disk cache developed for use in the a...
Luis M. Bernardo, Arie Shoshani, Alex Sim, Henrik ...
126
Voted
SSIAI
2000
IEEE
15 years 8 months ago
Pairwise Markov Random Fields and its Application in Textured Images Segmentation
The use of random fields, which allows one to take into account the spatial interaction among random variables in complex systems, is a frequent tool in numerous problems of stati...
Wojciech Pieczynski, Abdel-Nasser Tebbache