Sciweavers

3625 search results - page 694 / 725
» On choosing
Sort
View
VLSISP
2008
104views more  VLSISP 2008»
14 years 11 months ago
Guidance of Loop Ordering for Reduced Memory Usage in Signal Processing Applications
Data dominated signal processing applications are typically described using large and multi-dimensional arrays and loop nests. The order of production and consumption of array ele...
Per Gunnar Kjeldsberg, Francky Catthoor, Sven Verd...
AIM
2002
14 years 11 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
BC
2004
94views more  BC 2004»
14 years 11 months ago
An adaptive neuro-fuzzy method ( ANFIS) for estimating single-trial movement-related potentials
Abstract. This study aims to recover transient, trialvarying evoked potentials (EPs), in particular the movement-related potentials (MRPs), embedded within the background cerebral ...
D. D. Ben Dayan Rubin, G. Baselli, Gideon F. Inbar...
CN
2004
122views more  CN 2004»
14 years 11 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
CORR
2004
Springer
208views Education» more  CORR 2004»
14 years 11 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham