Sciweavers

4511 search results - page 605 / 903
» Observation Based System Security
Sort
View
ICASSP
2008
IEEE
15 years 11 months ago
Maximum likelihood binary detection in improper complex gaussian noise
In a wide range of communication systems, including DS-CDMA and OFDM systems, the signal-of-interest might be corrupted by an improper [1] (also called non circularly symmetric [2...
Amirhossein S. Aghaei, Konstantinos N. Plataniotis...
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 10 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
ICRA
2007
IEEE
162views Robotics» more  ICRA 2007»
15 years 10 months ago
Robopal: Modeling Role Transitions in Human-Robot Interaction
— We have developed a new communication robot, Robopal, which is an indoor/outdoor robot for use in humanrobot interaction research in the context of daily life. Robopal’s inte...
Dylan F. Glas, Takahiro Miyashita, Hiroshi Ishigur...
WACV
2007
IEEE
15 years 10 months ago
Video-based Metrology of Water Droplet Spreading on Nanostructured Surfaces
Dynamic wettability of a nanostructured surface is an important property for many liquid-related applications of nanostructures. The dynamic wettability analysis is performed by m...
Samuel Cheng, Xingzhi Luo, Suchendra M. Bhandarkar...
WCRE
2007
IEEE
15 years 10 months ago
A Study of Consistent and Inconsistent Changes to Code Clones
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
Jens Krinke