Sciweavers

3190 search results - page 83 / 638
» cans 2011
Sort
View
DIMVA
2011
14 years 4 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
65
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Anti-forensics for frame deletion/addition in MPEG video
Due to the ease with which digital information can be altered, many digital forensic techniques have recently been developed to authenticate multimedia content. One important digi...
Matthew C. Stamm, K. J. Ray Liu
101
Voted
CORR
2011
Springer
133views Education» more  CORR 2011»
14 years 4 months ago
Minimizing the sum of many rational functions
We consider the problem of globally minimizing the sum of many rational functions over a given compact semialgebraic set. The number of terms can be large (10 to 100), the degree ...
Florian Bugarin, Didier Henrion, Jean B. Lasserre
ICASSP
2011
IEEE
14 years 4 months ago
Enhancement of uneven lighting text image using line-based Empirical Mode Decomposition
Non-uniform light distribution problems often arise in the text images taken by digital camera. In this paper, we propose a novel technique for text image uneven lighting removal ...
Soo-Chang Pei, Mary Tzeng, Yu-Zhe Hsiao
154
Voted
CAL
2011
14 years 18 days ago
DRAMSim2: A Cycle Accurate Memory System Simulator
—In this paper we present DRAMSim2, a cycle accurate memory system simulator. The goal of DRAMSim2 is to be an accurate and publicly available DDR2/3 memory system model which ca...
Paul Rosenfeld, Elliott Cooper-Balis, Bruce Jacob