Sciweavers

1456 search results - page 131 / 292
» Keeping encountered information
Sort
View
102
Voted
VTC
2007
IEEE
15 years 8 months ago
Decision Directed Channel Estimation Employing Projection Approximation Subspace Tracking
— The attainable capacity and integrity of a state-of-the-art broadband multi-carrier communication system is highly sensitive to the accuracy of the information available concer...
Jos Akhtman, Lajos Hanzo
IH
2007
Springer
15 years 8 months ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
121
Voted
UCS
2007
Springer
15 years 8 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
IAT
2006
IEEE
15 years 7 months ago
Realising Common Knowledge Assumptions in Agent Auctions
Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are commo...
Frank Guerin, Emmanuel M. Tadjouddine
109
Voted
ISPASS
2006
IEEE
15 years 7 months ago
Accelerating architectural exploration using canonical instruction segments
Detailed microarchitectural simulators are not well suited for exploring large design spaces due to their excessive simulation times. We introduce AXCIS, a framework for fast and ...
Rose F. Liu, Krste Asanovic