Sciweavers

404 search results - page 28 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
147
Voted
PAMI
2012
13 years 6 months ago
Pedestrian Detection: An Evaluation of the State of the Art
—Pedestrian detection is a key problem in computer vision, with several applications that have the potential to positively impact quality of life. In recent years, the number of ...
Piotr Dollár, Christian Wojek, Bernt Schiel...
137
Voted
TELE
2008
85views more  TELE 2008»
15 years 3 months ago
Iris recognition and the challenge of homeland and border control security in UAE
This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significanc...
Ahmad N. Al-Raisi, Ali M. Al-Khouri
189
Voted
ICOIN
2003
Springer
15 years 8 months ago
Information-Theoretic Bounds for Mobile Ad-hoc Networks Routing Protocols
Abstract. In this paper, we define the routing overhead as the amount of information needed to describe the changes in a network topology. We derive a universal lower bound on the...
Nianjun Zhou, Alhussein A. Abouzeid
129
Voted
CODES
2007
IEEE
15 years 10 months ago
Performance and resource optimization of NoC router architecture for master and slave IP cores
System-on-Chip architectures incorporate several IP cores with well defined master and slave characteristics in terms of on-chip communication. The paper presents a parameterized ...
Glenn Leary, Krishna Mehta, Karam S. Chatha
118
Voted
PPL
2007
150views more  PPL 2007»
15 years 3 months ago
Open MPI: a High Performance, Flexible Implementation of MPI Point-to-Point Communications
’s point-to-point communications abstractions, described in this paper, handle several different communications scenarios, with a portable, high-performance design and tation. ...
Richard L. Graham, Brian Barrett, Galen M. Shipman...