Sciweavers

2824 search results - page 421 / 565
» Text Generation from Keywords
Sort
View
HOST
2008
IEEE
15 years 10 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
140
Voted
ISSAC
2007
Springer
99views Mathematics» more  ISSAC 2007»
15 years 9 months ago
Computing monodromy via parallel homotopy continuation
Numerical homotopy continuation gives a powerful tool for the applied scientist who seeks solutions to a system of polynomial equations. Techniques from numerical homotopy continu...
Anton Leykin, Frank Sottile
OOPSLA
2007
Springer
15 years 9 months ago
Detection and correction of design defects in object-oriented designs
Design defects come from poor design choices and have the effect of degrading the quality of object-oriented designs. Therefore, they present opportunities for improvements. Howev...
Naouel Moha
VTC
2006
IEEE
114views Communications» more  VTC 2006»
15 years 9 months ago
Iterative Joint PIC and 2D MMSE-FDE for Turbo-coded HARQ with SC-MIMO Multiplexing
— Broadband wireless packet access will be the core technology of the next generation mobile communication systems. For very high-speed and high-quality packet transmissions, the...
Akinori Nakajima, Fumiyuki Adachi
128
Voted
CSCW
2006
ACM
15 years 9 months ago
FeedMe: a collaborative alert filtering system
As the number of alerts generated by collaborative applications grows, users receive more unwanted alerts. FeedMe is a general alert management system based on XML feed protocols ...
Shilad Sen, Werner Geyer, Michael J. Muller, Marty...