Sciweavers

897 search results - page 66 / 180
» Identity: How to name it, How to find it
Sort
View
ICSM
2007
IEEE
15 years 8 months ago
Package Surface Blueprints: Visually Supporting the Understanding of Package Relationships
Large object-oriented applications are structured over large number of packages. Packages are important but complex structural entities that may be difficult to understand since ...
Stéphane Ducasse, Damien Pollet, Mathieu Su...
97
Voted
MEMOCODE
2007
IEEE
15 years 8 months ago
From WiFi to WiMAX: Techniques for High-Level IP Reuse across Different OFDM Protocols
Orthogonal Frequency-Division Multiplexing (OFDM) has become the preferred modulation scheme for both broadband and high bitrate digital wireless protocols because of its spectral...
Man Cheuk Ng, Muralidaran Vijayaraghavan, Nirav Da...
COSIT
2007
Springer
114views GIS» more  COSIT 2007»
15 years 7 months ago
Spatial Information Extraction for Cognitive Mapping with a Mobile Robot
When animals (including humans) first explore a new environment, what they remember is fragmentary knowledge about the places visited. Yet, they have to use such fragmentary knowl...
Jochen Schmidt, Chee K. Wong, Wai K. Yeap
127
Voted
ML
1998
ACM
139views Machine Learning» more  ML 1998»
15 years 1 months ago
The Hierarchical Hidden Markov Model: Analysis and Applications
We introduce, analyze and demonstrate a recursive hierarchical generalization of the widely used hidden Markov models, which we name Hierarchical Hidden Markov Models (HHMM). Our m...
Shai Fine, Yoram Singer, Naftali Tishby
IACR
2011
161views more  IACR 2011»
14 years 1 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf