Sciweavers

2192 search results - page 366 / 439
» Embedded function composition
Sort
View
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 2 months ago
Off-network Control for Scalable Routing in Very Large Sensor Networks
—This paper presents an architectural solution to address the problem of scalable routing in very large sensor networks. The control complexities of the existing sensor routing p...
Tao Wu, Subir K. Biswas
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
14 years 2 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
IBPRIA
2007
Springer
14 years 1 months ago
Handwritten Symbol Recognition by a Boosted Blurred Shape Model with Error Correction
One of the major difficulties of handwriting recognition is the variability among symbols because of the different writer styles. In this paper we introduce the boosting of blurre...
Alicia Fornés, Sergio Escalera, Josep Llad&...
IESS
2007
Springer
156views Hardware» more  IESS 2007»
14 years 1 months ago
Automatic Data Path Generation from C code for Custom Processors
The stringent performance constraints and short time to market of modern digital systems require automatic methods for design of high performance applicationspecific architectures...
Jelena Trajkovic, Daniel Gajski