Sciweavers

1953 search results - page 235 / 391
» Embedded Probabilistic Programming
Sort
View
GLOBECOM
2007
IEEE
15 years 8 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
123
Voted
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 8 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
143
Voted
ICDCS
2002
IEEE
15 years 7 months ago
ControlWare: A Middleware Architecture for Feedback Control of Software Performance
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded sys...
Ronghua Zhang, Chenyang Lu, Tarek F. Abdelzaher, J...
134
Voted
ISSS
2002
IEEE
124views Hardware» more  ISSS 2002»
15 years 7 months ago
A New Performance Evaluation Approach for System Level Design Space Exploration
Application specific systems have potential for customization of design with a view to achieve a better costperformance-power trade-off. Such customization requires extensive de...
M. Balakrishnan, Anshul Kumar, C. P. Joshi
SIGGRAPH
1993
ACM
15 years 6 months ago
Turbulent wind fields for gaseous phenomena
The realistic depiction of smoke, steam, mist and water reacting to a turbulent eld such as wind is an attractive and challenging problem. Its solution requires interlocking model...
Jos Stam, Eugene Fiume