Sciweavers

1799 search results - page 233 / 360
» Design considerations for MRAM
Sort
View
ICCCN
2008
IEEE
15 years 11 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ICPR
2008
IEEE
15 years 11 months ago
Intuitive event modeling for personalized behavior monitoring
Behavior understanding and semantic interpretation of dynamic visual scenes have attracted a lot of attention in computer vision research community. Although the use of surveillan...
Ahmed Azough, Alexandre Delteil, Fabien De Marchi,...
ICRA
2008
IEEE
164views Robotics» more  ICRA 2008»
15 years 11 months ago
Bilateral energy transfer in delayed teleoperation on the time domain
— The time domain passivity framework is attracting interest as a method for granting stability in both telerobotics and haptic contexts; this paper employs this approach in orde...
Jordi Artigas, Carsten Preusche, Gerd Hirzinger, G...
ISCAS
2008
IEEE
86views Hardware» more  ISCAS 2008»
15 years 11 months ago
Minimum redundancy MIMO radars
—The multiple-input multiple-output (MIMO) radar concept has drawn considerable attention recently. In the traditional single-input multiple-output (SIMO) radar system, the trans...
Chun-Yang Chen, Palghat P. Vaidyanathan
IV
2008
IEEE
133views Visualization» more  IV 2008»
15 years 11 months ago
Mining Scholarly Semantic Networks from the Web
With the increased usage of the Web and its availability of data, various scholarly information is now available on the Web. Extraction, aggregation, and visualization of such inf...
Mizuki Oka, Yutaka Matsuo