Sciweavers

8468 search results - page 1565 / 1694
» The Technology of Data Stashing
Sort
View
ICWL
2004
Springer
15 years 3 months ago
Learning Algorithms with an Electronic Chalkboard over the Web
This paper describes a system for the animation of algorithms on an electronic chalkboard. The instructor teaching an algorithm can enter data directly through a drawing- the algor...
Margarita Esponda Argüero, Raúl Rojas
KR
2004
Springer
15 years 3 months ago
Advanced Research with Autonomous Unmanned Aerial Vehicles
Abstract The emerging area of intelligent unmanned aerial vehicle (UAV) research has shown rapid development in recent years and offers a great number of research challenges for ar...
Patrick Doherty
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 3 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
DATE
2003
IEEE
106views Hardware» more  DATE 2003»
15 years 3 months ago
Reconfigurable Signal Processing in Wireless Terminals
In this paper, we show the necessity of reconfigurable hardware for data and signal processing in wireless mobile terminals. We first identify the key processing power requirement...
Jürgen Helmschmidt, Eberhard Schüler, Pr...
DISCEX
2003
IEEE
15 years 3 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
« Prev « First page 1565 / 1694 Last » Next »