Sciweavers

7118 search results - page 1173 / 1424
» Electrical and Computer Engineering
Sort
View
149
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach
—With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet ...
Shaoxuan Wang, Sujit Dey
ICASSP
2009
IEEE
15 years 10 months ago
MIMO decoding based on stochastic reconstruction from multiple projections
Least squares (LS) fitting is one of the most fundamental techniques in science and engineering. It is used to estimate parameters from multiple noisy observations. In many probl...
Amir Leshem, Jacob Goldberger
ICDAR
2009
IEEE
15 years 10 months ago
Devanagari and Bangla Text Extraction from Natural Scene Images
With the increasing popularity of digital cameras attached with various handheld devices, many new computational challenges have gained significance. One such problem is extractio...
Ujjwal Bhattacharya, Swapan K. Parui, Srikanta Mon...
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
15 years 10 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
140
Voted
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 10 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
« Prev « First page 1173 / 1424 Last » Next »