Sciweavers

1141 search results - page 155 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
PAM
2007
Springer
15 years 10 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
AMDO
2006
Springer
15 years 8 months ago
Human Motion Synthesis by Motion Manifold Learning and Motion Primitive Segmentation
Abstract. We propose motion manifold learning and motion primitive segmentation framework for human motion synthesis from motion-captured data. High dimensional motion capture date...
Chan-Su Lee, Ahmed M. Elgammal
DSN
2004
IEEE
15 years 8 months ago
Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline
The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital...
Nicholas J. Wang, Justin Quek, Todd M. Rafacz, San...
IJNSEC
2006
110views more  IJNSEC 2006»
15 years 4 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
TCS
2010
15 years 2 months ago
Error-repair parsing schemata
Robustness, the ability to analyze any input regardless of its grammaticality, is a desirable property for any system dealing with unrestricted natural language text. Error-repair...
Carlos Gómez-Rodríguez, Miguel A. Al...