Sciweavers

2593 search results - page 314 / 519
» On Two Problems of Nano-PLA Design
Sort
View
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 6 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
ICS
2005
Tsinghua U.
15 years 5 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad
CVPR
2008
IEEE
16 years 1 months ago
Pair-activity classification by bi-trajectories analysis
In this paper, we address the pair-activity classification problem, which explores the relationship between two active objects based on their motion information. Our contributions...
Yue Zhou, Shuicheng Yan, Thomas S. Huang
DAC
2003
ACM
16 years 15 days ago
A tool for describing and evaluating hierarchical real-time bus scheduling policies
We present a tool suite for building, simulating, and analyzing the results of hierarchical descriptions of the scheduling policy for modules sharing a bus in real-time applicatio...
Trevor Meyerowitz, Claudio Pinello, Alberto L. San...
ICCS
2009
Springer
15 years 6 months ago
Experience with Approximations in the Trust-Region Parallel Direct Search Algorithm
Recent years have seen growth in the number of algorithms designed to solve challenging simulation-based nonlinear optimization problems. One such algorithm is the Trust-Region Par...
S. M. Shontz, V. E. Howle, P. D. Hough