Sciweavers

232 search results - page 42 / 47
» Contraction Approach to Power Control, with Non-Monotonic Ap...
Sort
View
76
Voted
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 3 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
ICUIMC
2011
ACM
14 years 1 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...
KDD
2012
ACM
247views Data Mining» more  KDD 2012»
13 years 2 days ago
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks
Real-world, multiple-typed objects are often interconnected, forming heterogeneous information networks. A major challenge for link-based clustering in such networks is its potent...
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan...
ECCV
2008
Springer
15 years 11 months ago
Flexible Depth of Field Photography
The range of scene depths that appear focused in an image is known as the depth of field (DOF). Conventional cameras are limited by a fundamental trade-off between depth of field a...
Hajime Nagahara, Sujit Kuthirummal, Changyin Zhou,...
CODES
2005
IEEE
15 years 3 months ago
Future wireless convergence platforms
As wireless platforms converge to multimedia systems, architectures must converge to support voice, data, and video applications. From a processor architecture perspective, suppor...
C. John Glossner, Mayan Moudgill, Daniel Iancu, Ga...