Sciweavers

562 search results - page 102 / 113
» Dependency Pairs Revisited
Sort
View
IFIP
2009
Springer
14 years 1 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
ICASSP
2008
IEEE
14 years 1 months ago
Joint tracking and video registration by factorial Hidden Markov models
Tracking moving objects from image sequences obtained by a moving camera is a difficult problem since there exists apparent motion of the static background. It becomes more dif...
Xue Mei, Fatih Murat Porikli
IJCNN
2008
IEEE
14 years 1 months ago
Filter Bank Common Spatial Pattern (FBCSP) in Brain-Computer Interface
—In motor imagery-based Brain Computer Interfaces (BCI), discriminative patterns can be extracted from the electroencephalogram (EEG) using the Common Spatial Pattern (CSP) algor...
Kai Keng Ang, Zhang Yang Chin, Haihong Zhang, Cunt...
COMSWARE
2006
IEEE
14 years 1 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan
INFOCOM
2005
IEEE
14 years 1 months ago
Topology aware overlay networks
— Recently, overlay networks have emerged as a means to enhance end-to-end application performance and availability. Overlay networks attempt to leverage the inherent redundancy ...
Junghee Han, David Watson, Farnam Jahanian