Sciweavers

1163 search results - page 211 / 233
» Concurrent Subspaces Analysis
Sort
View
TIFS
2008
145views more  TIFS 2008»
14 years 9 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
JCM
2007
59views more  JCM 2007»
14 years 9 months ago
QAM Resource Allocation in Mixed-Format VoD Systems
— A Quadrature Amplitude Modulation (QAM) resource allocation algorithm for Video on Demand (VoD) traffic is presented. Based on stream encoding rates and available system capaci...
Jiong Gong, David Reed, Terry Shaw, Daniel A. Viva...
CORR
1999
Springer
111views Education» more  CORR 1999»
14 years 9 months ago
Ensembles of Radial Basis Function Networks for Spectroscopic Detection of Cervical Pre-Cancer
The mortality related to cervical cancer can be substantially reduced through early detection and treatment. However, current detection techniques, such as Pap smear and colposcop...
Kagan Tumer, Nirmala Ramanujam, Joydeep Ghosh, Reb...
TKDE
2002
67views more  TKDE 2002»
14 years 9 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
VLDB
2002
ACM
122views Database» more  VLDB 2002»
14 years 9 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski