Sciweavers

796 search results - page 126 / 160
» Spoofing prevention method
Sort
View
160
Voted
TIP
2011
231views more  TIP 2011»
14 years 11 months ago
Variational Bayesian Super Resolution
—In this paper, we address the super resolution (SR) problemfromasetofdegradedlowresolution(LR)imagestoobtain a high resolution (HR) image. Accurate estimation of the sub-pixel m...
S. Derin Babacan, Rafael Molina, Aggelos K. Katsag...
ICASSP
2011
IEEE
14 years 8 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
162
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Topic-sensitive interactive image object retrieval with noise-proof relevance feedback
One current direction to enhance the search accuracy in visual object retrieval is to reformulate the original query through (pseudo-)relevance feedback, which augments a query wi...
Jen-Hao Hsiao, Henry Chang
157
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
261
Voted
ASUNAM
2011
IEEE
14 years 5 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...