نتایج جستجو برای: uniform code
تعداد نتایج: 276198 فیلتر نتایج به سال:
The use of arithmetic coding for binary image compression achieves a high compression ratio while the running time remains rather slow. A composite modelling method presented in this paper reduces the size of the data to be coded by arithmetic coding. The method is to code the uniform areas with less computation and apply arithmetic coding to the areas with more variation.
Excel lacks features for modular design. Had it such features, as do most programming languages, they would save time, avoid unneeded programming, make mistakes less likely, make code-control easier, help organisations adopt a uniform house style, and open business opportunities in buying and selling spreadsheet modules. I present Excelsior, a system for bringing these benefits to Excel.
In this paper, we construct a Cartesian authentication code from subspaces of orthogonal space F (2ν+1) q of odd characteristic and compute its parameters. Assuming that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of successful impersonation attack and substitution attack are also computed.
Department of Energy and Hydrocarbon Ch Kyoto University, Katsura, Nishikyo-ku, Kyot kyoto-u.ac.jp; Fax: +81-75-383-2504; Tel: +8 Department of Chemistry and Biological Sc Aoyama Gakuin University, 5-10-1 Fuchinobe E-mail: [email protected]. 759-6229 † Electronic supplementary informatio experimental procedure and MS spectra o and HPLC prole of VPA before 10.1039/c6ra28079j Cite t...
The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law. Perfect matchings in random i—regular, 5—uniform hypergraphs.
This paper deals with scheduling, mapping and partitioning techniques for uniform loop nests. It is shown how the diierent techniques of scheduling, of mapping and of partitioning are linked and how code generation can be derived according to these methods. Our approach is based upon extensions of systolic array design methodologies.
Institute of Materials Science & Nanotechn Ankara, Turkey. E-mail: [email protected] +90 312 290 8987 UNAM-National Nanotechnology Research Turkey Gazi University, Department of Medical Bi 06500, Besevler, Ankara, Turkey. E-mail: 6271; Tel: +90 312 484 6270 Gazi University, Life Sciences Application Ankara, Turkey † Electronic supplementary informa 10.1039/c5ra20739h Cite this: RSC Adv., 2015, 5,...
Phishing attack is used to steal confidential information of user. Fraud websites appear similar to genuine websites with the logo and graphics of trusted website. Fraud Website Detection application aims to detect fraud websites using data mining techniques. This project provides intelligent solution to phishing attack. W3C standard defines characteristics which can be used to distinguish frau...
To simplify the task of constructing wrapper/monitor for the information sources in data warehouse systems, we provide a modularized design method to re-use the code. By substituting some parts of wrapper modules, we can re-use the wrapper on a dierent information source. For each information source, we also develop a toolkit to generate a corresponding monitor. By the method, we can reduce mu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید