Sciweavers

39 search results - page 7 / 8
» Strength of Two Data Encryption Standard Implementations und...
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 6 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
CODES
2003
IEEE
15 years 5 months ago
Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and crypt
This paper describes a hardware-software co-design approach for flexible programmable Galois Field Processing for applications which require operations over GF(2m ), such as RS an...
Wei Ming Lim, Mohammed Benaissa
DILS
2007
Springer
15 years 6 months ago
Fast Approximate Duplicate Detection for 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectroscopy is a powerful analytical method to elucidate the chemical structure of molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra cor...
Björn Egert, Steffen Neumann, Alexander Hinne...
BMCBI
2011
14 years 3 months ago
Smith-Waterman Peak Alignment for Comprehensive Two-dimensional Gas Chromatography Mass Spectrometry
Background: Comprehensive two-dimensional gas chromatography coupled with mass spectrometry (GC × GCMS) is a powerful technique which has gained increasing attention over the las...
Seongho Kim, Imhoi Koo, Aiqin Fang, Xiang Zhang
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 11 months ago
Empirical Evaluation of Four Tensor Decomposition Algorithms
Higher-order tensor decompositions are analogous to the familiar Singular Value Decomposition (SVD), but they transcend the limitations of matrices (second-order tensors). SVD is ...
Peter D. Turney