Sciweavers

1565 search results - page 179 / 313
» An unlikely result
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
Searching in the Delta Lattice: An Efficient MIMO Detection for Iterative Receivers
This paper introduces a new framework of the multiple-input multiple-output (MIMO) detection in iterative receivers. Unlike the conventional methods processing with symbol lattice,...
I-Wei Lai, Chun-Hao Liao, Ernst Martin Witte, Davi...
ACSAC
2004
IEEE
14 years 2 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 2 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ASAP
2004
IEEE
115views Hardware» more  ASAP 2004»
14 years 2 months ago
Design of the QBIC Wearable Computing Platform
Wearable computing systems can be broadly defined as mobile electronic devices that can be unobtrusively embedded in a user's outfit as part of the garment or an accessory. U...
Oliver Amft, Michael Lauffer, Stijn Ossevoort, Fab...
AMDO
2006
Springer
14 years 2 months ago
Combined Head, Lips, Eyebrows, and Eyelids Tracking Using Adaptive Appearance Models
The ability to detect and track human heads and faces in video sequences is useful in a great number of applications, such as human-computer interaction and gesture recognition. Re...
Fadi Dornaika, Javier Orozco, Jordi Gonzàle...