Sciweavers

172 search results - page 10 / 35
» Exploiting the Analogy Between Traces and Signal Processing
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Statistical analysis of amplitude modulation in speech signals using an AM-FM model
Several studies have been dedicated to the analysis and modeling of AM–FM modulations in speech and different algorithms have been proposed for the exploitation of modulations i...
Pirros Tsiakoulis, Alexandros Potamianos
ICASSP
2010
IEEE
13 years 7 months ago
Oversampling transmit and receive antenna arrays
A dense antenna array architecture is developed to ease the circuit requirements of the radio frequency (RF) front-end in beamforming applications. In the architecture, antennas a...
Chen-Pang Yeang, Gregory W. Wornell, Lizhong Zheng
IH
2007
Springer
14 years 1 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 1 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
AUIC
2006
IEEE
14 years 1 months ago
A wearable fatigue monitoring system: application of human-computer interaction evaluation
We developed a wearable fatigue monitoring system with a high-sensitivity 2-axis accelerometer and an on-board signal processing microcontroller. The proposed system measures fain...
Soichiro Matsushita, Ayumi Shiba, Kan Nagashima