Sciweavers

1488 search results - page 259 / 298
» A Probabilistic Segmentation Scheme
Sort
View
ISCAS
2006
IEEE
116views Hardware» more  ISCAS 2006»
15 years 10 months ago
Signal processing for brain-computer interface: enhance feature extraction and classification
Abstract-In this paper we present a new scheme for brain imaginary movement invovles sophisticated spatial-temporalsignal processing and classification for electroencephalogram spe...
Haihong Zhang, Cuntai Guan, Yuanqing Li
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
15 years 10 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
SRDS
2005
IEEE
15 years 10 months ago
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance
Quorum protocols offer several benefits when used to maintain replicated data but techniques for reducing overheads associated with them have not been explored in detail. It is d...
Lei Kong, Deepak J. Manohar, Mustaque Ahamad, Arun...
SIGSOFT
2004
ACM
15 years 9 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
WICON
2008
15 years 5 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami