Sciweavers

3735 search results - page 598 / 747
» Order compression schemes
Sort
View
84
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks
Abstract—In order to improve scalability and reduce maintenance overhead for structured Peer-to-Peer systems, researchers design optimal architectures with constant degree and lo...
Deke Guo, Yunhao Liu, Xiang-Yang Li
79
Voted
IROS
2008
IEEE
112views Robotics» more  IROS 2008»
15 years 7 months ago
Minimally invasive torque sensor for tendon-driven robotic hands
— The purpose of this paper is to present preliminary results on the use of a torque sensor based on a Bragg grating for torque control applications of tendon-driven mechanisms. ...
Ciro Natale, Salvatore Pirozzi
77
Voted
ISCAS
2008
IEEE
106views Hardware» more  ISCAS 2008»
15 years 7 months ago
Hilbert transformers with a piecewise-polynomial-sinusoidal impulse response
— Hilbert transformers are one of the very important special classes of finite impulse response (FIR) filters used in signal processing applications. A method is presented to s...
Raija Lehto, Tapio Saramäki, Olli Vainio
111
Voted
ISECS
2008
IEEE
15 years 7 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
15 years 7 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...