Sciweavers

14761 search results - page 2864 / 2953
» Optimization in Data Mining
Sort
View
CORR
2010
Springer
261views Education» more  CORR 2010»
15 years 1 months ago
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel
In this paper, we show that over the binary erasure channel, Quasi-Cyclic LDPC codes can efficiently accommodate the hybrid iterative/ML decoding. We demonstrate that the quasicycl...
Mathieu Cunche, Valentin Savin, Vincent Roca
ITIIS
2010
129views more  ITIIS 2010»
14 years 11 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
TC
2010
14 years 11 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
TITB
2010
138views Education» more  TITB 2010»
14 years 11 months ago
Local structure-based region-of-interest retrieval in brain MR images
The aging population and the growing amount of medical data have increased the need for automated tools in the neurology departments. Although the researchers have been developing ...
Devrim Unay, Ahmet Ekin, Radu S. Jasinschi
TMM
2010
115views Management» more  TMM 2010»
14 years 11 months ago
Representations of Keypoint-Based Semantic Concept Detection: A Comprehensive Study
Based on the local keypoints extracted as salient image patches, an image can be described as a "bag-of-visualwords (BoW)" and this representation has appeared promising ...
Yu-Gang Jiang, Jun Yang 0003, Chong-Wah Ngo, Alexa...
« Prev « First page 2864 / 2953 Last » Next »