Sciweavers

96 search results - page 14 / 20
» se 2008
Sort
View
TWC
2008
109views more  TWC 2008»
14 years 9 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
JUCS
2008
132views more  JUCS 2008»
14 years 9 months ago
Searching ... in a Web
: Search engines--"web dragons"--are the portals through which we access society's treasure trove of information. They do not publish the algorithms they use to sort...
Ian H. Witten
POPL
2009
ACM
15 years 10 months ago
Automatic modular abstractions for linear constraints
c Modular Abstractions for Linear Constraints David Monniaux VERIMAG June 27, 2008 se a method for automatically generating abstract transformers for static by abstract interpreta...
David Monniaux
DAS
2008
Springer
14 years 11 months ago
Difference of Boxes Filters Revisited: Shadow Suppression and Efficient Character Segmentation
A robust segmentation is the most important part of an automatic character recognition system (e.g. document processing, license plate recognition etc.). In our contribution we pr...
Erik Rodner, Herbert Süße, Wolfgang Ort...
MUE
2008
IEEE
177views Multimedia» more  MUE 2008»
15 years 4 months ago
Abnormal Gait Detection Using Discrete Fourier Transform
Detection of gait characteristics has found considerable interest in field of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection emplo...
Ahmed Mostayed, Mohammad Mynuddin Gani Mazumder, S...