Sciweavers

42 search results - page 5 / 9
» Author Identification Using Compression Models
Sort
View
MASCOTS
2010
13 years 9 months ago
Efficient Discovery of Loop Nests in Execution Traces
Execution and communication traces are central to performance modeling and analysis. Since the traces can be very long, meaningful compression and extraction of representative beha...
Qiang Xu, Jaspal Subhlok, Nathaniel Hammen
VTC
2010
IEEE
195views Communications» more  VTC 2010»
13 years 5 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...

Book
4675views
15 years 5 months ago
Mathematics of The Discrete Fourier Transform (DFT) with Audio Applications
"The Discrete Fourier Transform (DFT) can be understood as a numerical approximation to the Fourier transform. However, the DFT has its own exact Fourier theory, which is the ...
Julius O. Smith III
AICCSA
2006
IEEE
90views Hardware» more  AICCSA 2006»
14 years 1 months ago
ICE: A System for Identification of Conflicts in Exams
Although E-learning has advanced considerably in the last decade, some of its aspects, such as E-testing, are still in the development phase. Authoring tools and test banks for E-...
Hicham Hage, Esma Aïmeur
CCS
2007
ACM
13 years 11 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels