Sciweavers

1778 search results - page 301 / 356
» On the Power of the Randomized Iterate
Sort
View
VLSI
2010
Springer
14 years 4 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
FGR
2011
IEEE
255views Biometrics» more  FGR 2011»
14 years 1 months ago
Beyond simple features: A large-scale feature search approach to unconstrained face recognition
— Many modern computer vision algorithms are built atop of a set of low-level feature operators (such as SIFT [1], [2]; HOG [3], [4]; or LBP [5], [6]) that transform raw pixel va...
David D. Cox, Nicolas Pinto
ICASSP
2011
IEEE
14 years 1 months ago
Reconfigurable decoder architectures for Raptor codes
Decoder architectures for architecture-aware Raptor codes having regular message access-and-processing patterns are presented. Raptor codes are a class of concatenated codes compo...
Hady Zeineddine, Mohammad M. Mansour
ICASSP
2011
IEEE
14 years 1 months ago
Phase-sensitive speech enhancement for cochlear implant processing
In this paper, we present a new approach to enhance noisy speech based on an environmental model incorporating the phase between noise and clean speech (often called phasesensitiv...
Pourya S. Jafari, Hou-Yong Kang, Xiaosong Wang, Qi...
ICASSP
2011
IEEE
14 years 1 months ago
Global emergent behaviors in clouds of agents
—Networks of biological agents (for example, ants, bees, fish, birds) and complex man-made cyberphysical infrastructures (for example, the power grid, transportation networks) e...
Soummya Kar, José M. F. Moura