Sciweavers

8177 search results - page 1565 / 1636
» Detecting System Emulators
Sort
View
IJCV
2007
363views more  IJCV 2007»
13 years 10 months ago
Image Analysis and Reconstruction using a Wavelet Transform Constructed from a Reducible Representation of the Euclidean Motion
Abstract. Inspired by the early visual system of many mammalians we consider the construction of-and reconstruction from- an orientation score Uf : R2 ×S1 → C as a local orienta...
Remco Duits, Michael Felsberg, Gösta H. Granl...
TCOM
2008
80views more  TCOM 2008»
13 years 10 months ago
Power reduction techniques for multiple-subcarrier modulated diffuse wireless optical channels
In this paper, two novel techniques are proposed to reduce the average optical power in wireless optical multiplesubcarrier modulated (MSM) systems, namely in-band trellis coding a...
Weiwei Kang, Steve Hranilovic
TPDS
2008
78views more  TPDS 2008»
13 years 10 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
TSP
2008
109views more  TSP 2008»
13 years 10 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
TWC
2008
85views more  TWC 2008»
13 years 10 months ago
Improved BDFE Using A Priori Information for Turbo Equalization
Abstract-- Turbo equalization improves communication system performance by iteratively exchanging information between soft-input soft-output (SISO) equalizer and SISO channel decod...
Jingxian Wu, Sang-Yick Leong, Kah-Ping Lee, Chengs...
« Prev « First page 1565 / 1636 Last » Next »