Sciweavers

1050 search results - page 94 / 210
» Two methods of authenticated positioning
Sort
View
ACL
2009
14 years 11 months ago
Semi-supervised Learning of Dependency Parsers using Generalized Expectation Criteria
In this paper, we propose a novel method for semi-supervised learning of nonprojective log-linear dependency parsers using directly expressed linguistic prior knowledge (e.g. a no...
Gregory Druck, Gideon S. Mann, Andrew McCallum
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 8 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
VTC
2010
IEEE
147views Communications» more  VTC 2010»
15 years 9 days ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
JMIV
2007
83views more  JMIV 2007»
15 years 1 months ago
Minimization of a Detail-Preserving Regularization Functional for Impulse Noise Removal
Recently, a powerful two-phase method for restoring images corrupted with high level impulse noise has been developed. The main drawback of the method is the computational efficie...
Jian-Feng Cai, Raymond H. Chan, Carmine Di Fiore
TSMC
2008
102views more  TSMC 2008»
15 years 1 months ago
Context-Dependent DNA Coding With Redundancy and Introns
Abstract--Deoxyribonucleic acid (DNA) coding methods determine the meaning of a certain character in individual chromosomes by the characters surrounding it. The meaning of each ch...
Peng Xiao, Prahlad Vadakkepat, Tong Heng Lee