Sciweavers

252 search results - page 37 / 51
» Entropy Based Associative Memory
Sort
View

Publication
145views
14 years 5 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
NIPS
2008
14 years 11 months ago
Psychiatry: Insights into depression through normative decision-making models
Decision making lies at the very heart of many psychiatric diseases. It is also a central theoretical concern in a wide variety of fields and has undergone detailed, in-depth, ana...
Quentin J. M. Huys, Joshua T. Vogelstein, Peter Da...
JSAC
2006
181views more  JSAC 2006»
14 years 9 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
TCSV
2002
121views more  TCSV 2002»
14 years 9 months ago
Rate-constrained multihypothesis prediction for motion-compensated video compression
Abstract-- This article investigates linearly combined motion-compensated signals for video compression. In particular, we discuss multiple motion-compensated signals that are join...
Markus Flierl, Thomas Wiegand, Bernd Girod
ISCA
2011
IEEE
386views Hardware» more  ISCA 2011»
14 years 1 months ago
Architecting on-chip interconnects for stacked 3D STT-RAM caches in CMPs
Emerging memory technologies such as STT-RAM, PCRAM, and resistive RAM are being explored as potential replacements to existing on-chip caches or main memories for future multi-co...
Asit K. Mishra, Xiangyu Dong, Guangyu Sun, Yuan Xi...