Sciweavers

699 search results - page 113 / 140
» mc 2008
Sort
View
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
13 years 12 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
13 years 12 months ago
Performance of a Wireless Unattended Sensor Network in a Freshwater Environment
This effort investigated the use of wireless unattended sensor network motes in the surroundings of a freshwater lake. The network was required to organize, establish and maintain...
John C. McEachen, Juan Casias
CC
2008
Springer
144views System Software» more  CC 2008»
13 years 7 months ago
Control Flow Emulation on Tiled SIMD Architectures
Heterogeneous multi-core and streaming architectures such as the GPU, Cell, ClearSpeed, and Imagine processors have better power/ performance ratios and memory bandwidth than tradi...
Ghulam Lashari, Ondrej Lhoták, Michael McCo...
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 7 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ECAI
2008
Springer
13 years 7 months ago
Approximate structure preserving semantic matching
Abstract. Typical ontology matching applications, such as ontology integration, focus on the computation of correspondences holding between the nodes of two graph-like structures, ...
Fausto Giunchiglia, Mikalai Yatskevich, Fiona McNe...