Sciweavers

1953 search results - page 125 / 391
» codes 2010
Sort
View
131
Voted
ESORICS
2010
Springer
15 years 5 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
IAJIT
2010
123views more  IAJIT 2010»
15 years 3 months ago
Implementation of a speech coding strategy for auditory implants
: In this paper we present the conception and the implementation of a speech processing interface for cochlea prosthesis. This module is based on a numerical speech processing algo...
Lamia Bouafif, Kais Ouni, Noureddine Ellouze
145
Voted
JMLR
2010
195views more  JMLR 2010»
15 years 3 months ago
Online Learning for Matrix Factorization and Sparse Coding
Sparse coding—that is, modelling data vectors as sparse linear combinations of basis elements—is widely used in machine learning, neuroscience, signal processing, and statisti...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
TCOM
2010
145views more  TCOM 2010»
15 years 2 months ago
Blind Cooperative Diversity Using Distributed Space-Time Coding in Block Fading Channels
— Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in whic...
Kamel Tourki, Mohamed-Slim Alouini, Luc Deneire
EMNLP
2010
15 years 2 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark