Πλοήγηση Articles ανά ημερομηνία δημοσίευσης
Αποτελέσματα 1-20 από 70
-
Fast and Efficient TSC-Checkers for m-out-of (2m ± 1) codes
(IEEE, 1983-06)This note is concerned with the design of fast totally self-checking checkers for m-out-of-(2m ± 1) codes. The new method uses only three levels of gates, and is based on the partitioning of the input lines into m blocks ...
-
Towards a Parallel Inference Hnchine: the APIH project
(Microprocessing and Microprogmmmlng, 1990-08)This paper gives an overview of the APIM (Aristotle Parallel Inference Machine) research project, which aims to the design of a new multiprocessor architecture for the parallel execution of logic programs. The APIM system ...
-
Linear-testable and C-testable Nx~x Ny~ modified Booth multipliers
(Institution of Engineering and Technology (IET), 1996)The testability of modified Booth multipliers is examined with respect to the cell fault model, an implementation-independent fault model. This is especially useful in design environments where the cell realisations are ...
-
An Analysis of the Handover Latency Components in Mobile IPv6
(IEEE, 2009)This article analyses the latency components in Mobile IPv6 handovers. It provides real-implementation results for significant parts of the handover process through measurements in a real MIPv6 implementation on a wireless ...
-
An Experimental Analysis of the Mobile IPv6 Handover Latency Components
(2009)This paper examines the handover process of Mobile IPv6 in a real wireless testbed, based on IEEE 802.11b and extracts information on the actions taken by network entities during the movement of a mobile node. This work ...
-
Towards privacy in personal data management
(2009)Purpose – In order to enhance privacy protection during electronic transactions, the purpose of this paper is to propose, develop, and evaluate a personal data management framework called Polis that abides by the following ...
-
Accurate Image Retrieval Based on Compact Composite Descriptors and Relevance Feedback Information
(World Scientific Publishing Company, 2010)In this paper a new set of descriptors appropriate for image indexing and retrieval is proposed. The proposed descriptors address the tremendously increased need for e±cient content-based image retrieval (CBIR) in many ...
-
Investigating the Behavior of Compact Composite Descriptors in Early Fusion, Late Fusion and Distributed Image Retrieval
(2010)In Content-Based Image Retrieval (CBIR) systems, the visual content of the images is mapped into a new space named the feature space. The features that are chosen must be discriminative and sufficient for the description ...
-
A novel cellular automata based technique for visual multimedia content encryption
(Elsevier, 2010)This paper proposes a new method for visual multimedia content encryption using Cellular Automata (CA). The encryption scheme is based on the application of an attribute of the CLF XOR filter, according to which the original ...
-
Content based radiology image retrieval using a fuzzy rule based scalable composite descriptor
(2010)The rapid advances made in the field of radiology, the increased frequency in which oncological diseases appear, as well as the demand for regular medical checks, led to the creation of a large database of radiology ...
-
Fast Retrieval from Image Databases via Binary Haar Wavelet Transform on the Color and Edge Directivity Descriptor
(IARIA, 2011)In this paper, we are evaluating several accelerating techniques for content-based image retrieval, suitable for the Color and Edge Directivity Descriptor (CEDD). To date, the experimental results presented in the ...
-
Text localization using standard deviation analysis of structure elements and support vector machines
(Springer, 2011)A text localization technique is required to successfully exploit document images such as technical articles and letters. The proposed method detects and extracts text areas from document images. Initially a connected ...
-
S-GinMob: Soft-Handoff Solution for Mobile Users in Industrial Environments
(IEEE, 2011)In current research studies and testbed deployments of sensor networks, individual sensor nodes are usually assumed to be static. However, recent applications require mobile sensor nodes, something that poses unique ...
-
Historical research in archives: user methodology and supporting tools
(Springer, 2011)Historic research involves finding, using, and correlating information within primary and secondary sources, in order to communicate an understanding of past events. In this process, historians employ their scientific ...
-
Co.Vi.Wo.: Color Visual Words Based on Non-Predefined Size Codebooks
(IEEE, 2012)Due to the rapid development of information technology and the continuously increasing number of available multimedia data, the task of retrieving information based on visual content has become a popular subject of scientific ...
-
Mobility Management in WSNs using Fuzzy Logic: An Industrial Application Scenario
(IEEE, 2012)Mobility management in Wireless Sensor Networks is considered to be of an up most importance for today's critical applications. In this paper, we present a soft mobility management solution where the mobility procedures ...
-
Controlling the Handoff Procedure in an Oil Refinery Environment Using Fuzzy Logic
(IEEE, 2012)Mobility is one of the most important challenges in a wireless sensor system. Usually, continuous connectivity of a Mobile Node (MN) is achieved by supporting handoff from one connection point to another. In order to ...
-
Radio Propagation in Industrial Wireless Sensor Network Environments: From Testbed to Simulation Evaluation
(ACM, 2012)In recent years, sensor networks characteristics have led to incremental utilization in different types of applications. Several techniques have been proposed to evaluate the performance of WSNs; the two most popular being ...
-
A query scrambler for search privacy on the internet
(Springer Link, 2012-10-09)We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search results, without submitting the intended query ...
-
An efficient privacy-preserving solution for finding the nearest doctor
(Personal and Ubiquitous Computing volume, 2012-10-30)In this work, we define the Nearest Doctor Problem for finding the nearest doctor in case of an emergency and present a privacy-preserving protocol for solving it. The solution is based on cryptographic primitives and makes ...