Sciweavers

6202 search results - page 1127 / 1241
» Without Loss of Generality
Sort
View
CCS
2009
ACM
15 years 1 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
CODES
2009
IEEE
15 years 1 months ago
An MDP-based application oriented optimal policy for wireless sensor networks
Technological advancements due to Moore’s law have led to the proliferation of complex wireless sensor network (WSN) domains. One commonality across all WSN domains is the need ...
Arslan Munir, Ann Gordon-Ross
GLOBECOM
2009
IEEE
15 years 1 months ago
A New Coupling Channel Estimator for Cross-Talk Cancellation at Wireless Relay Stations
In this paper, we are concerned with cross-talk interference from the transmit to the receive antenna of a wireless channel-reuse-relay-station (CRRS) that forwards signals over t...
Jun Ma, Ye (Geoffrey) Li, Jinyun Zhang, Toshiyuki ...
86
Voted
GLOBECOM
2009
IEEE
15 years 1 months ago
Conjectural Equilibrium in Water-Filling Games
—This paper considers a non-cooperative game in which competing users sharing a frequency-selective interference channel selfishly optimize their power allocation in order to imp...
Yi Su, Mihaela van der Schaar
105
Voted
CVPR
2010
IEEE
15 years 1 months ago
Ray Markov Random Fields for Image-Based 3D Modeling: Model and Efficient Inference
In this paper, we present an approach to multi-view image-based 3D reconstruction by statistically inversing the ray-tracing based image generation process. The proposed algorithm...
Shubao Liu, David Cooper
« Prev « First page 1127 / 1241 Last » Next »