Sciweavers

1249 search results - page 43 / 250
» Limitations of the Even-Mansour Construction
Sort
View
JDCTA
2010
169views more  JDCTA 2010»
13 years 4 months ago
A Synchronization Algorithm of MRI Denoising and Contrast Enhancement Based on PM-CLAHE Model
On clinical applications, many magnetic resonance (MR) Images obtained directly by the instruments are not satisfied by doctors. For example, there are some noises and poor contra...
Di Jia, Fangfang Han, Jinzhu Yang, Yifei Zhang, Da...
JUCS
2010
135views more  JUCS 2010»
13 years 4 months ago
Model-driven Transformation and Validation of Adaptive Educational Hypermedia using CAVIAr
Abstract: Authoring of Adaptive Educational Hypermedia is a complex activity requiring the combination of a range of design and validation techniques. We demonstrate how Adaptive E...
Mark Melia, Claus Pahl
ICASSP
2011
IEEE
13 years 1 months ago
Adaptive modelling with tunable RBF network using multi-innovation RLS algorithm assisted by swarm intelligence
— In this paper, we propose a new on-line learning algorithm for the non-linear system identification: the swarm intelligence aided multi-innovation recursive least squares (SIM...
Hao Chen, Yu Gong, Xia Hong
CISS
2011
IEEE
13 years 1 months ago
Secret key generation through OFDM multipath channel
—We analyze the fundamental limits of key generation and describe an implementation based on error correcting codes. We show that key extraction based on channel coefficients si...
Yanpei Liu, Stark C. Draper, Akbar M. Sayeed
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
14 years 4 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate