Sciweavers

1628 search results - page 162 / 326
» Compiler Construction Using Scheme
Sort
View
ICPR
2008
IEEE
16 years 6 months ago
Fingerprint indexing based on composite set of reduced SIFT features
Most of current fingerprint indexing schemes utilize features based on global textures and minutiae structures. To extend the existing technology of feature extraction, this paper...
Xin Shuai, Chao Zhang, Pengwei Hao
ASIACRYPT
2007
Springer
15 years 9 months ago
On Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have propo...
Goce Jakimoski, K. P. Subbalakshmi
151
Voted
ECCE
2007
15 years 6 months ago
Design of argument diagramming for case-based group learning
Argument diagramming tools can improve reasoning and learning. They are likely to have a significant place in future virtual learning environments whose design will be dominated b...
John Dowell, Thomas Gladisch
124
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Interference cancellation for OFDM systems with hierarchical modulation over non-linear satellite channels
This paper presents an efficient technique to eliminate the inter-layer interference (ILI) inherent in hierarchical modulation (HM) schemes operating over nonlinear satellite cha...
Emad Q. Al-Dalakta, Charalampos C. Tsimenidis, Bay...
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 11 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan