Sciweavers

16190 search results - page 2849 / 3238
» Applicative programming with effects
Sort
View
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 10 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
INTERSPEECH
2010
14 years 10 months ago
Articulatory synthesis and perception of plosive-vowel syllables with virtual consonant targets
Virtual articulatory targets are a concept to explain the different trajectories of primary and secondary articulators during consonant production, as well as the different places...
Peter Birkholz, Bernd J. Kröger, Christiane N...
IVS
2010
44views more  IVS 2010»
14 years 10 months ago
Generalized scatter plots
Scatter Plots are one of the most powerful and most widely used techniques for visual data exploration. A well-known problem is that scatter plots often have a high degree of overl...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal, Halld...
JAIR
2010
130views more  JAIR 2010»
14 years 10 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger
JCIT
2010
162views more  JCIT 2010»
14 years 10 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
« Prev « First page 2849 / 3238 Last » Next »