Sciweavers

2449 search results - page 149 / 490
» Tensor Embedding Methods
Sort
View
113
Voted
IEICET
2008
147views more  IEICET 2008»
15 years 2 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...
FPL
2010
Springer
131views Hardware» more  FPL 2010»
15 years 16 days ago
Reducing Power Consumption of an Embedded DSP Platform through the Clock-Gating Technique
The paper describes application of the clock-gating techniques, often used in ASIC designs, to the field of FPGAbased systems. The clock-gating techniques are used to reduce the to...
Antonin Hermanek, Michal Kunes, Milan Tichý
137
Voted
ICPR
2010
IEEE
15 years 14 days ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
ICASSP
2011
IEEE
14 years 6 months ago
Signal-based segmentation of human locomotion using embedded sensor network
We introduce a simple approach to segment in homogeneous phases a long-duration record of locomotion data consisting of body segment acceleration and foot pressure information onl...
Maud Pasquier, Bernard Espiau, Christine Azevedo-C...
140
Voted
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
15 years 7 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...