Sciweavers

2237 search results - page 77 / 448
» On the Security of Random Sources
Sort
View
ICSM
2006
IEEE
15 years 11 months ago
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding
One approach to supporting program comprehension involves binding concepts to source code. Previously proposed approaches to concept binding have enforced nonoverlapping boundarie...
Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahda...
VTC
2010
IEEE
172views Communications» more  VTC 2010»
15 years 3 months ago
Turbo Source Compression with Jointly Optimized Inner Irregular and Outer Irregular Codes
—In this paper, we present a near-lossless compression scheme for scalar-quantized source codec parameters based on iterative source-channel decoding (ISCD). The scheme is compar...
Laurent Schmalen, Peter Vary, Thorsten Clevorn, Ma...
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 11 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
110
Voted
LREC
2008
117views Education» more  LREC 2008»
15 years 6 months ago
Semantic Vectors: a Scalable Open Source Package and Online Technology Management Application
This paper describes the open source SemanticVectors package that efficiently creates semantic vectors for words and documents from a corpus of free text articles. We believe that...
Dominic Widdows, Kathleen Ferraro
NIPS
2003
15 years 6 months ago
Subject-Independent Magnetoencephalographic Source Localization by a Multilayer Perceptron
We describe a system that localizes a single dipole to reasonable accuracy from noisy magnetoencephalographic (MEG) measurements in real time. At its core is a multilayer perceptr...
Sung C. Jun, Barak A. Pearlmutter