Sciweavers

2184 search results - page 391 / 437
» Relative Entropy and Statistics
Sort
View
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
15 years 6 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...
111
Voted
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 6 months ago
Distributed Cooperative Routing for UWB Ad-Hoc Networks
— Ultra wide band (UWB) ad-hoc networks have attracted much research attention in recent years. This paper proposes and investigates a new distributed cooperative routing strateg...
Shouhong Zhu, Kin K. Leung
100
Voted
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 6 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
IJCNN
2007
IEEE
15 years 6 months ago
Using Artificial Neural Networks and Feature Saliency Techniques for Improved Iris Segmentation
—One of the basic challenges to robust iris recognition is iris segmentation. This paper proposes the use of a feature saliency algorithm and an artificial neural network to perf...
Randy P. Broussard, Lauren R. Kennell, David L. So...
101
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo