Sciweavers

1992 search results - page 131 / 399
» On the (limited) power of non-equivocation
Sort
View
ACSAC
2005
IEEE
15 years 7 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
GLOBECOM
2009
IEEE
15 years 5 months ago
Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning
In this paper, cognitive transmission under quality of service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sen...
Sami Akin, Mustafa Cenk Gursoy
DAGSTUHL
2001
15 years 3 months ago
Decision-Theoretic Control of Planetary Rovers
Planetary rovers are small unmanned vehicles equipped with cameras and a variety of sensors used for scientific experiments. They must operate under tight constraints over such res...
Shlomo Zilberstein, Richard Washington, Daniel S. ...
CVPR
2007
IEEE
16 years 4 months ago
Robust Local Features and their Application in Self-Calibration and Object Recognition on Embedded Systems
In recent years many powerful Computer Vision algorithms have been invented, making automatic or semiautomatic solutions to many popular vision tasks, such as visual object recogn...
Clemens Arth, Christian Leistner, Horst Bischof
ICIP
2003
IEEE
16 years 3 months ago
Variance-aware distortion estimation for wireless video communications
Tie problem of encoding and transmitting a video sequence over a wireless channel is considered. Our objective is to minimize the end-to-end didortimi while using a limited amount...
Yiftach Eisenberg, Fan Zhai, Carlos E. Luna, Thras...