Sciweavers

892 search results - page 177 / 179
» Calculating with Requirements
Sort
View
PDP
2011
IEEE
12 years 11 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
INFOCOM
2011
IEEE
12 years 10 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
IPMI
2011
Springer
12 years 10 months ago
Fast Brain Matching with Spectral Correspondence
Abstract. Brain matching is an important problem in neuroimaging studies. Current surface-based methods for cortex matching and atlasing, although quite accurate, can require long ...
Herve Lombaert, Leo Grady, Jonathan R. Polimeni, F...
CRV
2011
IEEE
305views Robotics» more  CRV 2011»
12 years 7 months ago
Motion Segmentation by Learning Homography Matrices from Motor Signals
—Motion information is an important cue for a robot to separate foreground moving objects from the static background world. Based on the observation that the motion of the backgr...
Changhai Xu, Jingen Liu, Benjamin Kuipers
IACR
2011
207views more  IACR 2011»
12 years 7 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li