Sciweavers

2997 search results - page 520 / 600
» Fuzzy robustness analysis
Sort
View
TIFS
2008
145views more  TIFS 2008»
13 years 8 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TIFS
2008
179views more  TIFS 2008»
13 years 8 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
TIFS
2008
208views more  TIFS 2008»
13 years 8 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
TIP
2008
344views more  TIP 2008»
13 years 8 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
JCC
2007
110views more  JCC 2007»
13 years 8 months ago
Improved grid-based algorithm for Bader charge allocation
: An improvement to the grid-based algorithm of Henkelman et al. for the calculation of Bader volumes is suggested, which more accurately calculates atomic properties as predicted ...
Edward Sanville, Steven D. Kenny, Roger Smith, Gra...