Sciweavers

34181 search results - page 6672 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
125
Voted
CGF
2008
126views more  CGF 2008»
15 years 3 months ago
Part-type Segmentation of Articulated Voxel-Shapes using the Junction Rule
We present a part-type segmentation method for articulated voxel-shapes based on curve skeletons. Shapes are considered to consist of several simpler, intersecting shapes. Our met...
Dennie Reniers, Alexandru Telea
118
Voted
CORR
2010
Springer
141views Education» more  CORR 2010»
15 years 3 months ago
FPGA Implementation of LS Code Generator for CDM Based MIMO Channel Sounder
MIMO (Multi Input Multi Output) wireless communication system is an innovative solution to improve the bandwidth efficiency by exploiting multipath-richness of the propagation envi...
M. Habib Ullah, Md. Niamul Bari, A. Unggul Prianto...
126
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 3 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
118
Voted
CORR
2010
Springer
98views Education» more  CORR 2010»
15 years 3 months ago
Maximal Intersection Queries in Randomized Input Models
Consider a family of sets and a single set, called the query set. How can one quickly find a member of the family which has a maximal intersection with the query set? Time constra...
Benjamin Hoffmann, Mikhail Lifshits, Yury Lifshits...
143
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 3 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
« Prev « First page 6672 / 6837 Last » Next »