Sciweavers

741 search results - page 118 / 149
» Abstract Machines for Communication Security
Sort
View
JRTIP
2008
300views more  JRTIP 2008»
13 years 10 months ago
Real-time human action recognition on an embedded, reconfigurable video processing architecture
Abstract In recent years, automatic human action recognition has been widely researched within the computer vision and image processing communities. Here we propose a realtime, emb...
Hongying Meng, Michael Freeman, Nick Pears, Chris ...
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 4 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
GLOBECOM
2009
IEEE
14 years 4 months ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu
ICC
2009
IEEE
134views Communications» more  ICC 2009»
14 years 4 months ago
Short-Length Raptor Codes for Mobile Free-Space Optical Channels
Abstract—Free-space optical (FSO) links are competitive wireless links offering high data rate, security and low system complexity. For mobile applications, e.g., from a ground b...
Wenzhe Zhang, Steve Hranilovic
ICC
2009
IEEE
100views Communications» more  ICC 2009»
14 years 4 months ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta