Sciweavers

1652 search results - page 188 / 331
» Matching Vector Codes
Sort
View
CODES
2005
IEEE
15 years 5 months ago
Microcoded coprocessor for embedded secure biometric authentication systems
We design and implement a cryptographic biometric authentication system using a microcoded architecture. The secure properties of the biometric matching process are obtained by me...
Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhe...
ISSS
1999
IEEE
149views Hardware» more  ISSS 1999»
15 years 4 months ago
A Buffer Merging Technique for Reducing Memory Requirements of Synchronous Dataflow Specifications
Synchronous Dataflow, a subset of dataflow, has proven to be a good match for specifying DSP programs. Because of the limited amount of memory in embedded DSPs, a key problem duri...
Praveen K. Murthy, Shuvra S. Bhattacharyya
SODA
1998
ACM
144views Algorithms» more  SODA 1998»
15 years 1 months ago
Analysis of Random Processes via And-Or Tree Evaluation
We introduce a new set of probabilistic analysis tools based on the analysis of And-Or trees with random inputs. These tools provide a unifying, intuitive, and powerful framework ...
Michael Luby, Michael Mitzenmacher, Mohammad Amin ...
ADHOCNOW
2008
Springer
15 years 26 days ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
CORR
2008
Springer
129views Education» more  CORR 2008»
14 years 12 months ago
Tight Bounds on the Capacity of Binary Input random CDMA Systems
Abstract-- We consider code division multiple access communication over a binary input additive white Gaussian noise channel using random spreading. For a general class of symmetri...
Satish Babu Korada, Nicolas Macris