—During post-silicon processor debugging, we need to frequently capture and dump out the internal state of the processor. Since internal state constitutes all memory elements, th...
Anant Vishnoi, Preeti Ranjan Panda, M. Balakrishna...
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
— Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices and thereby supporting a plurality of ...
George Athanasiou, Ioannis Broustis, Thanasis Kora...
In recent years, many document image retrieval algorithms have been proposed. However, most of the current approaches either need good quality images or depend on the page layout ...
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...