Sciweavers

699 search results - page 113 / 140
» mc 2008
Sort
View
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
15 years 7 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
15 years 7 months ago
Performance of a Wireless Unattended Sensor Network in a Freshwater Environment
This effort investigated the use of wireless unattended sensor network motes in the surroundings of a freshwater lake. The network was required to organize, establish and maintain...
John C. McEachen, Juan Casias
CC
2008
Springer
144views System Software» more  CC 2008»
15 years 2 months ago
Control Flow Emulation on Tiled SIMD Architectures
Heterogeneous multi-core and streaming architectures such as the GPU, Cell, ClearSpeed, and Imagine processors have better power/ performance ratios and memory bandwidth than tradi...
Ghulam Lashari, Ondrej Lhoták, Michael McCo...
97
Voted
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
15 years 2 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ECAI
2008
Springer
15 years 2 months ago
Approximate structure preserving semantic matching
Abstract. Typical ontology matching applications, such as ontology integration, focus on the computation of correspondences holding between the nodes of two graph-like structures, ...
Fausto Giunchiglia, Mikalai Yatskevich, Fiona McNe...