Sciweavers

5355 search results - page 360 / 1071
» Modules
Sort
View
IFIP
2010
Springer
14 years 10 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
TCOM
2010
87views more  TCOM 2010»
14 years 10 months ago
Performance of an AFC Loop in the Presence of a Single Interferer in a Fading Channel
The performance of an automatic frequency control (AFC) loop is investigated using two measures, the mean time to loss of lock and the average switching rate. The AFC is considere...
Amin Emad, Norman C. Beaulieu
TON
2010
125views more  TON 2010»
14 years 10 months ago
Computational analysis and efficient algorithms for micro and macro OFDMA downlink scheduling
OFDMA is one of the most important modulation and access methods for the future mobile networks. Before transmitting a frame on the downlink, an OFDMA base station has to invoke an...
Reuven Cohen, Liran Katzir
103
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Combining HMM-based melody extraction and NMF-based soft masking for separating voice and accompaniment from monaural audio
Modern monaural voice and accompaniment separation systems usually consist of two main modules: melody extraction and timefrequency masking. A main distinction between different s...
Yun Wang, Zhijian Ou
104
Voted
ICASSP
2011
IEEE
14 years 7 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...