Sciweavers

3505 search results - page 589 / 701
» Information Theory and the IrisCode
Sort
View
JILP
2000
103views more  JILP 2000»
14 years 9 months ago
Comparing and Combining Profiles
How much do two profiles of the same program differ? When has a profile changed enough to warrant reexamination of the profiled program? And how should two or more profiles be com...
Serap A. Savari, Cliff Young
GRAMMARS
1998
111views more  GRAMMARS 1998»
14 years 9 months ago
Quantitative Comparison of Languages
From the perspective of the linguist, the theory of formal languages serves as an abstract model to address issues such as complexity, learnability, information content, etc. which...
András Kornai
CSCW
1999
ACM
14 years 9 months ago
Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work
No work is inherently either visible or invisible. We always "see" work through a selection of indicators: straining muscles, finished artifacts, a changed state of affai...
Susan Leigh Star, Anselm Strauss
VLSISP
2002
123views more  VLSISP 2002»
14 years 9 months ago
Monte Carlo Bayesian Signal Processing for Wireless Communications
Abstract. Many statistical signal processing problems found in wireless communications involves making inference about the transmitted information data based on the received signal...
Xiaodong Wang, Rong Chen, Jun S. Liu
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...