Sciweavers

2354 search results - page 420 / 471
» Tracking Stopping Times
Sort
View
TC
2008
14 years 11 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
TSMC
2008
138views more  TSMC 2008»
14 years 11 months ago
Fast Diagnosis With Sensors of Uncertain Quality
This correspondence presents an approach to the detection and isolation of component failures in large-scale systems. In the case of sensors that report at rates of 1 Hz or less, t...
Ozgur Erdinc, Craig Brideau, Peter Willett, Thiaga...
TIT
1998
121views more  TIT 1998»
14 years 11 months ago
Blind Multiuser Detection: A Subspace Approach
—A new multiuser detection scheme based on signal subspace estimation is proposed. It is shown that under this scheme, both the decorrelating detector and the linear minimummean-...
Xiaodong Wang, H. Vincent Poor
TON
2002
138views more  TON 2002»
14 years 11 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
APGV
2009
ACM
268views Visualization» more  APGV 2009»
15 years 3 months ago
Saliency maps of high dynamic range images
A number of computational models of visual attention have been proposed based on the concept of saliency map, most of them validated using oculometric data. They are widely used fo...
Josselin Petit, Roland Brémond, Jean-Philip...