Sciweavers

4529 search results - page 818 / 906
» Position Based Cryptography
Sort
View
CORR
2010
Springer
261views Education» more  CORR 2010»
14 years 10 months ago
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel
In this paper, we show that over the binary erasure channel, Quasi-Cyclic LDPC codes can efficiently accommodate the hybrid iterative/ML decoding. We demonstrate that the quasicycl...
Mathieu Cunche, Valentin Savin, Vincent Roca
132
Voted
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
14 years 10 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
BMCBI
2011
14 years 8 months ago
Clinical Synopsis Search in OMIM
Background: The OMIM database is a tool used daily by geneticists. Syndrome pages include a Clinical Synopsis section containing a list of known phenotypes comprising a clinical s...
Raphael Cohen, Avitan Gefen, Michael Elhadad, Ohad...
238
Voted
MVA
2011
336views Computer Vision» more  MVA 2011»
14 years 8 months ago
In-vehicle camera traffic sign detection and recognition
: In this paper we discuss theoretical foundations and a practical realization of a real-time traffic sign detection, tracking and recognition system operating on board of a vehicl...
Andrzej Ruta, Fatih Porikli, Shintaro Watanabe, Yo...
136
Voted
NAR
2010
122views more  NAR 2010»
14 years 7 months ago
ELM: the status of the 2010 eukaryotic linear motif resource
Linear motifs are short segments of multidomain proteins that provide regulatory functions independently of protein tertiary structure. Much of intracellular signalling passes thr...
Cathryn M. Gould, Francesca Diella, Allegra Via, P...