Sciweavers

1050 search results - page 71 / 210
» Two methods of authenticated positioning
Sort
View
ESORICS
2011
Springer
13 years 11 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
ISBI
2006
IEEE
16 years 16 days ago
Joint texture and topography estimation for extended depth of field in brightfield microscopy
Brightfield microscopy often suffers from limited depth of field, which prevents thick specimens from being imaged entirely in-focus. By optically sectioning the specimen, the inf...
François Aguet, Dimitri Van De Ville, Micha...
SASN
2003
ACM
15 years 5 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
ICIP
2006
IEEE
16 years 1 months ago
Anisotropic Gaussian Filtering using Fixed Point Arithmetic
Gaussian filtering in one, two or three dimensions is among the most commonly needed tasks in signal and image processing. Finite impulse response filters in the time domain with ...
Christoph H. Lampert, Oliver Wirjadi
ICPR
2004
IEEE
16 years 28 days ago
Event Semantics in Two-person Interactions
This paper presents a method to represent two-person interactions at a semantic level with a natural language description. A human interaction is composed of two singleperson acti...
Jake K. Aggarwal, Sangho Park