Sciweavers

1511 search results - page 260 / 303
» Active Risk Estimation
Sort
View
ICRA
1998
IEEE
114views Robotics» more  ICRA 1998»
14 years 3 days ago
A Twenty-Four Hour Tele-Nursing System Using a Ring Sensor
The objective of this paper is to present the recent development of the ring sensor to monitor a patient 24 hours a day for a tele-nursing system. The ring sensor is worn by the p...
Boo-Ho Yang, Sokwoo Rhee, Haruhiko Asada
IH
1998
Springer
14 years 2 days ago
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is ...
Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depove...
ISLPED
1997
ACM
83views Hardware» more  ISLPED 1997»
14 years 1 days ago
A symbolic algorithm for low-power sequential synthesis
We present an algorithm that restructures the state transition graph STG of a sequential circuit so as to reduce power dissipation. The STG is modi ed without changing the behav...
Balakrishna Kumthekar, In-Ho Moon, Fabio Somenzi
INFOCOM
1992
IEEE
13 years 12 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel
ECRIME
2007
13 years 11 months ago
Examining the impact of website take-down on phishing
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraud...
Tyler Moore, Richard Clayton