Sciweavers

667 search results - page 48 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
231
Voted
CADE
2011
Springer
14 years 2 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
131
Voted
ICML
2006
IEEE
16 years 3 months ago
Discriminative cluster analysis
Clustering is one of the most widely used statistical tools for data analysis. Among all existing clustering techniques, k-means is a very popular method because of its ease of pr...
Fernando De la Torre, Takeo Kanade
WS
2004
ACM
15 years 8 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
ICIP
2007
IEEE
16 years 4 months ago
A High-Speed Vision System for Moment-Based Analysis of Numerous Objects
We describe a high-speed vision system for real-time applications, which is capable of processing visual information at a frame rate of 1 kfps, including both imaging and processi...
Yoshihiro Watanabe, Takashi Komuro, Masatoshi Ishi...
90
Voted
ICSC
1995
Springer
15 years 6 months ago
Fast Resampling Using Vector Quantization
Abstract. We present a fast resampling scheme using vector quantization. Our method di ers from prior work applying vector quantization to speeding up image and volume processing i...
Patrick C. Teo, Chase D. Garfinkle