Sciweavers

1763 search results - page 231 / 353
» Dependent random choice
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Optimization of the antenna array geometry based on a Bayesian DOA estimation criterion
In this paper, we address the problem of the sensor placement for estimating the direction of a narrow-band source, randomly located in the far-field of a planar antenna array. E...
Houcem Gazzah, Jean Pierre Delmas
WIOPT
2011
IEEE
12 years 11 months ago
Lower bounds on the success probability for ad hoc networks with local FDMA scheduling
—This paper studies the performance of ad hoc networks with local FDMA scheduling using stochastic point processes. In such networks, the Poisson assumption is not justified due...
Ralph Tanbourgi, Jens P. Elsner, Holger Jäkel...
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
12 years 11 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...
IACR
2011
116views more  IACR 2011»
12 years 7 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
CVPR
1998
IEEE
14 years 10 months ago
Histogram Model for 3D Textures
Image texture can arise not only from surface albedo variations (2D texture) but also from surface height variations (3D texture). Since the appearance of 3D texture depends on th...
Kristin J. Dana, Shree K. Nayar