Sciweavers

967 search results - page 63 / 194
» Topical Word Embeddings
Sort
View
114
Voted
CASES
2003
ACM
15 years 5 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
115
Voted
ICIP
2005
IEEE
16 years 2 months ago
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking
Dirty paper trellis codes are a form of watermarking with side information. These codes have the advantage of being invariant to valumetric scaling of the cover Work. However, the...
Gwenaël J. Doërr, Ingemar J. Cox, Lin Li...
94
Voted
RAID
2009
Springer
15 years 7 months ago
Brave New World: Pervasive Insecurity of Embedded Network Devices
Abstract. Embedded network devices have become an ubiquitous fixture in the modern home, office as well as in the global communication infrastructure. Devices like routers, NAS ap...
Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore ...
104
Voted
RTCSA
1997
IEEE
15 years 4 months ago
On memory protection in real-time OS for small embedded systems
Memory protection is an important OS feature for the reliability and safety of real-time control systems. In this paper, we study the feasibility of memory protection in small emb...
Shoji Suzuki, Kang G. Shin
122
Voted
PR
2006
147views more  PR 2006»
15 years 16 days ago
Robust locally linear embedding
In the past few years, some nonlinear dimensionality reduction (NLDR) or nonlinear manifold learning methods have aroused a great deal of interest in the machine learning communit...
Hong Chang, Dit-Yan Yeung