Sciweavers

1518 search results - page 215 / 304
» Cryptographic Test Correction
Sort
View
104
Voted
EH
2005
IEEE
171views Hardware» more  EH 2005»
15 years 6 months ago
Implementation Results for a Fault-Tolerant Multicellular Architecture Inspired by Endocrine Communication
The hybrid redundancy structure found at the cellular level of higher animals provides complex organism with the three key features of a reliability-engineered system: fault toler...
Andrew J. Greensted, Andy M. Tyrrell
121
Voted
EUROMICRO
2005
IEEE
15 years 6 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
116
Voted
ICCV
2005
IEEE
15 years 6 months ago
Bayesian Body Localization Using Mixture of Nonlinear Shape Models
We present a 2D model-based approach to localizing human body in images viewed from arbitrary and unknown angles. The central component is a statistical shape representation of th...
Jiayong Zhang, Robert T. Collins, Yanxi Liu
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Optimization of source and channel coding for voice over IP
Voice over Internet Protocol (VoIP) applications must typically choose a tradeoff between the bits allocated for Forward Error Correcting (FEC) and that for the source coding to a...
Yicheng Huang, Jari Korhonen, Ye Wang
91
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
Spatial-temporal analysis of passive TCP measurements
— In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The fo...
Eli Brosh, G. Lubetzky-Sharon, Yuval Shavitt