Sciweavers

9316 search results - page 1763 / 1864
» Analysis of traceback techniques
Sort
View
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 6 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
AIPR
2007
IEEE
15 years 6 months ago
3D Scene Reconstruction through a Fusion of Passive Video and Lidar Imagery
Geometric structure of a scene can be reconstructed using many methods. In recent years, two prominent approaches have been digital photogrammetric analysis using passive stereo i...
Prudhvi Gurram, Stephen Lach, Eli Saber, Harvey E....
BIBE
2007
IEEE
162views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
An Investigation into the Feasibility of Detecting Microscopic Disease Using Machine Learning
— The prognosis for many cancers could be improved dramatically if they could be detected while still at the microscopic disease stage. We are investigating the possibility of de...
Mary Qu Yang, Jack Y. Yang
CODES
2007
IEEE
15 years 6 months ago
Three-dimensional multiprocessor system-on-chip thermal optimization
3D stacked wafer integration has the potential to improve multiprocessor system-on-chip (MPSoC) integration density, performance, and power efficiency. However, the power density...
Chong Sun, Li Shang, Robert P. Dick
GLOBECOM
2007
IEEE
15 years 6 months ago
Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks
—Network lifetime is a critical issue in Wireless Sensor Networks. It is possible to extend network lifetime by organizing the sensors into a number of sensor covers. However, wi...
Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002,...
« Prev « First page 1763 / 1864 Last » Next »