Sciweavers

14 search results - page 2 / 3
» Analyzing the effects of disk-pointer corruption
Sort
View
DSN
2006
IEEE
13 years 8 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
ICIP
2001
IEEE
14 years 6 months ago
Image reconstruction from localized Fourier magnitude
Fourier transform magnitude is, in many cases, the only measurable data in fields such as optics, x-ray imaging, crystallography and astronomy. Spectral phase information is impra...
Gil Michael, Moshe Porat
DSN
2005
IEEE
13 years 10 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
CVPR
2007
IEEE
14 years 7 months ago
Polarization and Phase-Shifting for 3D Scanning of Translucent Objects
Translucent objects pose a difficult problem for traditional structured light 3D scanning techniques. Subsurface scattering corrupts the range estimation in two ways: by drastical...
Tongbo Chen, Hendrik P. A. Lensch, Christian Fuchs...
DATE
2009
IEEE
131views Hardware» more  DATE 2009»
13 years 8 months ago
Optimizations of an application-level protocol for enhanced dependability in FlexRay
FlexRay [9] is an automotive standard for high-speed and reliable communication that is being widely deployed for next generation cars. The protocol has powerful errordetection me...
Wenchao Li, Marco Di Natale, Wei Zheng, Paolo Gius...