Sciweavers

276 search results - page 42 / 56
» icc 2008
Sort
View
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 4 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 4 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ICC
2008
IEEE
117views Communications» more  ICC 2008»
15 years 4 months ago
Cognitive Radio with Secondary Packet-By-Packet Vertical Handover
– According to the commons model of cognitive radio, the activity of secondary (unlicensed) nodes is required to guarantee quality-of-service (QoS) constraints on the transmissio...
Jonathan Gambini, Osvaldo Simeone, Umberto Spagnol...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 4 months ago
Backlog Aware Scheduling for Large Buffered Crossbar Switches
—A novel architecture was proposed in [1] to address scalability issues in large, high speed packet switches. The architecture proposed in [1], namely OBIG (output buffers with i...
Aditya Dua, Benjamin Yolken, Nicholas Bambos, Wlad...
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 4 months ago
Non-Differential DSTBCs for Partially-Coherent Cooperative Communication
— In a distributed space-time coding scheme, based on the relay channel model, the relay nodes co-operate to linearly process the transmitted signal from the source and forward t...
Jagadeesh Harshan, B. Sundar Rajan