Sciweavers

2131 search results - page 42 / 427
» Immunity for Closed Sets
Sort
View
SECON
2007
IEEE
15 years 4 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
JCIT
2010
152views more  JCIT 2010»
14 years 4 months ago
Novel MicroRNAs and Targets Prediction in PRRS Virus Genome
In this paper, 4 microRNAs and their targets were predicted through a de novo prediction procedure in the genome of Porcine Reproductive and Respiratory Syndrome virus. Through cl...
Zhenlin Wei
FGR
2008
IEEE
168views Biometrics» more  FGR 2008»
15 years 4 months ago
A discriminative approach to frame-by-frame head pose tracking
We present a discriminative approach to frame-by-frame head pose tracking that is robust to a wide range of illuminations and facial appearances and that is inherently immune to a...
Jacob Whitehill, Javier R. Movellan
ICASSP
2008
IEEE
15 years 4 months ago
Robust watermarking of 3D skinning mesh animations
This paper presents a novel robust watermarking algorithm for 3D skinning mesh animations by embedding the watermark in skin weights in addition to key frames. This method can be ...
Rakhi Motwani, Ameya Ambardekar, Mukesh Motwani, F...
ISCAS
2007
IEEE
90views Hardware» more  ISCAS 2007»
15 years 4 months ago
Leakage-Aware Design of Nanometer SoC
– In the sub-65 nm CMOS technologies, subthreshold and gate dielectric leakage currents need to be simultaneously suppressed for effective energy reduction. New low-leakage circu...
Volkan Kursun, Sherif A. Tawfik, Zhiyu Liu