Sciweavers

9842 search results - page 1949 / 1969
» Compositional timing analysis
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
INFOCOM
2010
IEEE
13 years 6 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
13 years 6 months ago
Optimization of Formant Feature Based Speech Recognition
The paper deals with the use of formant features in dynamic time warping based speech recognition. These features can be simply visualized and give a new insight into understanding...
Antanas Lipeika
IPL
2010
119views more  IPL 2010»
13 years 6 months ago
Note on Max Lin-2 above Average
In the Max Lin-2 problem we are given a system S of m linear equations in n variables over F2 in which Equation j is assigned a positive integral weight wj for each j. We wish to ...
Robert Crowston, Gregory Gutin, Mark Jones
ITIIS
2010
172views more  ITIIS 2010»
13 years 6 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
« Prev « First page 1949 / 1969 Last » Next »