Sciweavers

5962 search results - page 1003 / 1193
» Working with Patterns and Code
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
User selection schemes for maximizing throughput of multiuser MIMO systems using Zero Forcing Beamforming
The performance of a multiuser MIMO broadcast system depends highly on how the users being served are selected from the pool of users requesting service. Though dirty paper coding...
Anh H. Nguyen, Bhaskar D. Rao
ICASSP
2011
IEEE
14 years 7 months ago
Detection of upper airway narrowing via classification of LPC coefficients: Implications for obstructive sleep apnea diagnosis
The similarities between unvoiced speech sounds and turbulent breath sounds were used to detect change in sound characteristics caused by narrowing of the upper airway (UA), simil...
Hisham Alshaer, Martha Garcia, M. Hossein Radfar, ...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 7 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 7 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
DIMVA
2011
14 years 7 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
« Prev « First page 1003 / 1193 Last » Next »