Sciweavers

16 search results - page 3 / 4
» Layering Boundary Protections: An Experiment in Information ...
Sort
View
JCM
2007
191views more  JCM 2007»
13 years 6 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 6 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
MICCAI
2002
Springer
14 years 7 months ago
Recognizing Deviations from Normalcy for Brain Tumor Segmentation
A framework is proposed for the segmentation of brain tumors from MRI. Instead of training on pathology, the proposed method trains exclusively on healthy tissue. The algorithm att...
David T. Gering, W. Eric L. Grimson, Ron Kikinis
TASLP
2008
150views more  TASLP 2008»
13 years 6 months ago
Automatic Prosodic Event Detection Using Acoustic, Lexical, and Syntactic Evidence
With the advent of prosody annotation standards such as tones and break indices (ToBI), speech technologists and linguists alike have been interested in automatically detecting pro...
Sankaranarayanan Ananthakrishnan, Shrikanth S. Nar...
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 8 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...