Sciweavers

2714 search results - page 160 / 543
» Approximation Schemes for Scheduling
Sort
View
79
Voted
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
15 years 6 months ago
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
The Unbalanced Oil and Vinegar scheme (UOV) is a signature scheme based on multivariate quadratic equations. It uses m equations and n variables. A total of v of these are called ...
An Braeken, Christopher Wolf, Bart Preneel
CVPR
2007
IEEE
16 years 2 months ago
A Multi-Scale Tikhonov Regularization Scheme for Implicit Surface Modelling
Kernel machines have recently been considered as a promising solution for implicit surface modelling. A key challenge of machine learning solutions is how to fit implicit shape mo...
Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu
110
Voted
ICMCS
2008
IEEE
148views Multimedia» more  ICMCS 2008»
15 years 7 months ago
Loss tolerance scheme for 3D progressive meshes streaming over networks
– Nowadays, the Internet provides a convenient medium for sharing complex 3D models online. However, transmitting 3D progressive meshes over networks may encounter the problem of...
Hui Li, Ziying Tang, Xiaohu Guo, Balakrishnan Prab...
ICC
2007
IEEE
15 years 7 months ago
Spatially Coordinate-Interleaved Design for Mutually Cooperative Relay Scheme
– In this paper, we consider a novel spatial diversity scheme for a mutually cooperative relay (MCR) system in which two active users are simultaneously communicating with the sa...
Kyungmi Park, Hyun Seok Ryu, Heesoo Lee, Chung Gu ...
79
Voted
DATE
2006
IEEE
114views Hardware» more  DATE 2006»
15 years 6 months ago
A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap
Built-in self-repair (BISR) technique is gaining popular for repairing embedded memory cores in system-onchips (SOCs). To increase the utilization of memory redundancy, the BISR t...
Tsu-Wei Tseng, Jin-Fu Li, Da-Ming Chang