Sciweavers

18493 search results - page 3439 / 3699
» Timers for Distributed Systems
Sort
View
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TIP
2010
111views more  TIP 2010»
14 years 11 months ago
Green Noise Digital Halftoning With Multiscale Error Diffusion
Multiscale error diffusion (MED) is superior to conventional error diffusion algorithms as it can eliminate directional hysteresis completely and possesses a good blue noise chara...
Yik-Hing Fung, Yuk-Hee Chan
TIT
2010
97views Education» more  TIT 2010»
14 years 11 months ago
Why does the Kronecker model result in misleading capacity estimates?
Many recent works that study the performance of multi-input multi-output (MIMO) systems in practice assume a Kronecker model where the variances of the channel entries, upon decom...
Vasanthan Raghavan, Jayesh H. Kotecha, Akbar M. Sa...
TSP
2010
14 years 11 months ago
On the optimal performance in asymmetric gaussian wireless sensor networks with fading
We study the estimation of a Gaussian source by a Gaussian wireless sensor network (WSN) where L distributed sensors transmit noisy observations of the source through a fading Gau...
Hamid Behroozi, Fady Alajaji, Tamás Linder
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 11 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
« Prev « First page 3439 / 3699 Last » Next »