Sciweavers

16257 search results - page 3137 / 3252
» D-finiteness: algorithms and applications
Sort
View
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 3 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
IAT
2003
IEEE
15 years 3 months ago
Problem-solving in open environments
With the increasing use of the internet, many problemsolving tasks such as resource allocation, scheduling, planning, and configuration pose themselves in an open setting involvi...
Santiago Macho-Gonzalez, Boi Faltings
ICDM
2003
IEEE
101views Data Mining» more  ICDM 2003»
15 years 3 months ago
Interactive Visualization and Navigation in Large Data Collections using the Hyperbolic Space
We propose the combination of two recently introduced methods for the interactive visual data mining of large collections of data. Both, Hyperbolic Multi-Dimensional Scaling (HMDS...
Jörg A. Walter, Jörg Ontrup, Daniel Wess...
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
15 years 3 months ago
An experimental study of hybrid switched system approaches to visual servoing
Abstract— In the recent past, many researchers have developed control algorithms for visual servo applications. In this paper, we introduce a new hybrid switched system approach,...
Nicholas R. Gans, Seth Hutchinson
IWSOC
2003
IEEE
104views Hardware» more  IWSOC 2003»
15 years 3 months ago
Incorporating Pattern Prediction Technique for Energy Efficient Filter Cache Design
: - A filter cache is proposed at a higher level than the L1 (main) cache in the memory hierarchy and is much smaller. The typical size of filter cache is of the order of 512 Bytes...
Kugan Vivekanandarajah, Thambipillai Srikanthan, S...
« Prev « First page 3137 / 3252 Last » Next »