Sciweavers

503 search results - page 12 / 101
» If not now, when
Sort
View
88
Voted
DCC
2008
IEEE
16 years 9 days ago
On the second weight of generalized Reed-Muller codes
: Not much is known about the weight distribution of the generalized Reed-Muller code RMq(s, m) when q > 2, s > 2 and m 2 . Even the second weight is only known for values o...
Olav Geil
81
Voted
DCC
2007
IEEE
16 years 9 days ago
Bit Recycling with Prefix Codes
Many data compression methods cannot remove all redundancy from a file that they compress because it can be encoded to many compressed files. In particular, we consider the redund...
Danny Dubé, Vincent Beaudoin
ALT
2008
Springer
15 years 9 months ago
Exploiting Cluster-Structure to Predict the Labeling of a Graph
Abstract. The nearest neighbor and the perceptron algorithms are intuitively motivated by the aims to exploit the “cluster” and “linear separation” structure of the data to...
Mark Herbster
74
Voted
CHI
2010
ACM
15 years 7 months ago
Pico-ing into the future of mobile projector phones
Ten years ago we were on the verge of having cameras built into our mobile phones, but knew very little about what to expect or how they would be used. Now we are faced with the s...
Max L. Wilson, Simon Robinson, Dan Craggs, Kristia...
99
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
AProSec: an Aspect for Programming Secure Web Applications
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...