Sciweavers

859 search results - page 170 / 172
» The Changing Face of Cryptography
Sort
View
TCOM
2010
159views more  TCOM 2010»
13 years 4 months ago
Evolutionary cooperative spectrum sensing game: how to collaborate?
—Cooperative spectrum sensing has been shown to be able to greatly improve the sensing performance in cognitive radio networks. However, if cognitive users belong to different se...
Beibei Wang, K. J. Ray Liu, T. Charles Clancy
TCOM
2010
109views more  TCOM 2010»
13 years 4 months ago
Results on Finite Wireless Networks on a Line
Abstract— Today, due to the vast amount of literature on largescale wireless networks, we have a fair understanding of the asymptotic behavior of such networks. However, in real ...
Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik
TKDE
2010
200views more  TKDE 2010»
13 years 4 months ago
Incremental and General Evaluation of Reverse Nearest Neighbors
This paper presents a novel algorithm for Incremental and General Evaluation of continuous Reverse Nearest neighbor queries (IGERN, for short). The IGERN algorithm is general in t...
James M. Kang, Mohamed F. Mokbel, Shashi Shekhar, ...
ICCAD
2010
IEEE
136views Hardware» more  ICCAD 2010»
13 years 3 months ago
Synthesis of an efficient controlling structure for post-silicon clock skew minimization
Clock skew minimization has been an important design constraint. However, due to the complexity of Process, Voltage, and Temperature (PVT) variations, the minimization of clock sk...
Yu-Chien Kao, Hsuan-Ming Chou, Kun-Ting Tsai, Shih...
ICIP
2010
IEEE
13 years 3 months ago
People identification using shadow dynamics
People identification has numerous applications, ranging from surveillance/security to robotics. Face and body movement/gait biometrics are the most important tools for this task....
Yumi Iwashita, Adrian Stoica, Ryo Kurazume