Sciweavers

2642 search results - page 163 / 529
» The development of Chez Scheme
Sort
View
120
Voted
VTC
2010
IEEE
176views Communications» more  VTC 2010»
14 years 11 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo
114
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 6 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
114
Voted
RTCSA
1998
IEEE
15 years 5 months ago
Partition Scheduling in APEX Runtime Environment for Embedded Avionics Software
Advances in the computer technology encouraged the avionics industry to replace the federated design of control units with an integrated suite of control modules that share the co...
Yann-Hang Lee, Daeyoung Kim, Mohamed F. Younis, Je...
JSS
2008
217views more  JSS 2008»
15 years 22 days ago
MUSEMBLE: A novel music retrieval system with automatic voice query transcription and reformulation
So far, many researches have been done to develop efficient music retrieval systems, and query-by-humming has been considered as one of the most intuitive and effective query meth...
Seungmin Rho, Byeong-jun Han, Eenjun Hwang, Minkoo...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 20 days ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...