Sciweavers

3625 search results - page 694 / 725
» On choosing
Sort
View
VLSISP
2008
104views more  VLSISP 2008»
15 years 1 months ago
Guidance of Loop Ordering for Reduced Memory Usage in Signal Processing Applications
Data dominated signal processing applications are typically described using large and multi-dimensional arrays and loop nests. The order of production and consumption of array ele...
Per Gunnar Kjeldsberg, Francky Catthoor, Sven Verd...
AIM
2002
15 years 1 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
BC
2004
94views more  BC 2004»
15 years 1 months ago
An adaptive neuro-fuzzy method ( ANFIS) for estimating single-trial movement-related potentials
Abstract. This study aims to recover transient, trialvarying evoked potentials (EPs), in particular the movement-related potentials (MRPs), embedded within the background cerebral ...
D. D. Ben Dayan Rubin, G. Baselli, Gideon F. Inbar...
CN
2004
122views more  CN 2004»
15 years 1 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
CORR
2004
Springer
208views Education» more  CORR 2004»
15 years 1 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham