Sciweavers

1328 search results - page 167 / 266
» Common Knowledge
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
14 years 3 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
GLOBECOM
2007
IEEE
14 years 3 months ago
Soft Sensing and Optimal Power Control for Cognitive Radio
We consider a cognitive radio system where the secondary transmitter varies its transmit power based on all the information available from the spectrum sensor. The operation of th...
Sudhir Srinivasa, Syed Ali Jafar
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
14 years 3 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...
IROS
2007
IEEE
128views Robotics» more  IROS 2007»
14 years 3 months ago
Exploiting similarities for robot perception
— A cognitive robot system has to acquire and efficiently store vast knowledge about the world it operates in. To cope with every day tasks, a robot needs to learn, classify and...
Kai Welke, Erhan Oztop, Gordon Cheng, Rüdiger...
SMI
2007
IEEE
164views Image Analysis» more  SMI 2007»
14 years 3 months ago
Automatic multiview quadruple alignment of unordered range scans
This paper presents a new multiview alignment algorithm that performs both the coarse and fine alignment of unordered sets of range scans. Our algorithm selects quadruples of ran...
Frank B. ter Haar, Remco C. Veltkamp