Sciweavers

2470 search results - page 437 / 494
» Liveness-Preserving Simulation Relations
Sort
View
ICDE
2010
IEEE
174views Database» more  ICDE 2010»
13 years 8 months ago
Semantic flooding: Search over semantic links
Abstract-- Classification hierarchies are trees where links codify the fact that a node lower in the hierarchy contains documents whose contents are more specific than those one le...
Fausto Giunchiglia, Uladzimir Kharkevich, Alethia ...
ICIP
2010
IEEE
13 years 8 months ago
Passive imaging exploiting multiple scattering using distributed apertures
We develop a new passive image formation method capable of exploiting information about multiple scattering in the environment using measurements from a sparse array of receivers ...
Ling Wang, Il-Young Son, Birsen Yazici
ICWN
2010
13 years 8 months ago
Efficient Cluster Head Election in Surveillance Reconnaissance Sensor Network
- Using a wireless sensor network, variety applications are being developed. In this paper, considering the field of military surveillance and reconnaissance sensors in the network...
Young Bag Moon, Nae Soo Kim, Cheol Sig Pyo, Keun W...
IH
2010
Springer
13 years 8 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
ISQED
2011
IEEE
309views Hardware» more  ISQED 2011»
13 years 1 months ago
Modeling and analyzing NBTI in the presence of Process Variation
With continuous scaling of transistors in each technology generation, NBTI and Process Variation (PV) have become very important silicon reliability problems for the microprocesso...
Taniya Siddiqua, Sudhanva Gurumurthi, Mircea R. St...