Sciweavers

4109 search results - page 678 / 822
» Issues in Design and Implementation of Multimedia Software S...
Sort
View
JCM
2008
70views more  JCM 2008»
15 years 4 months ago
Reed-Solomon Codes for Low Power Communications
Power consumption is a critical issue for many applications running on autonomous battery operated devices. In the context of low power communications, the use of Forward Error Cor...
Lionel Biard, Dominique Noguet
CORR
2004
Springer
107views Education» more  CORR 2004»
15 years 4 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
TIT
1998
105views more  TIT 1998»
15 years 4 months ago
Diversity Waveform Sets for Delay-Doppler Imaging
Abstract— Properties of the ambiguity function and the uncertainty relation of Fourier transforms assert fundamental limitations on the ability of any single radar waveform of co...
Jiann-Ching Guey, Mark R. Bell
ISMAR
2002
IEEE
15 years 9 months ago
Augmented Chemistry: An Interactive Educational Workbench
This system paper reports on some of the advantages tangible interaction can bring to chemistry education. The paper describes the realisation of an in-house designed Tangible Use...
Morten Fjeld, Benedikt M. Voegtli
ACSAC
2005
IEEE
15 years 10 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth