Sciweavers

86 search results - page 11 / 18
» The counting pyramid: an adaptive distributed counting schem...
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
13 years 11 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
AINA
2004
IEEE
15 years 3 months ago
MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks
This paper presents a novel effective scheme of configuring Wireless Personal Area Networks (WPANs), called Master-driven Connection Control (MaCC). WPANs are based on a new wirel...
Makoto Takizawa, Hiroto Aida, Masato Saito, Yoshit...
TMI
1998
137views more  TMI 1998»
14 years 11 months ago
Dynamic Imaging and Tracer Kinetic Modeling for Emission Tomography Using Rotating Detectors
— When performing dynamic studies using emission tomography the tracer distribution changes during acquisition of a single set of projections. This is particularly true for some ...
Chi-Hoi Lau, David Dagan Feng, Brian F. Hutton, Da...
KDD
2004
ACM
170views Data Mining» more  KDD 2004»
15 years 5 months ago
Estimating the size of the telephone universe: a Bayesian Mark-recapture approach
Mark-recapture models have for many years been used to estimate the unknown sizes of animal and bird populations. In this article we adapt a finite mixture mark-recapture model i...
David Poole
IPPS
2010
IEEE
14 years 9 months ago
Overlapping computation and communication: Barrier algorithms and ConnectX-2 CORE-Direct capabilities
Abstract--This paper explores the computation and communication overlap capabilities enabled by the new CORE-Direct hardware capabilities introduced in the InfiniBand (IB) Host Cha...
Richard L. Graham, Stephen W. Poole, Pavel Shamis,...