Sciweavers

1747 search results - page 237 / 350
» Long Range Dependence
Sort
View
135
Voted
HOST
2008
IEEE
15 years 10 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
130
Voted
ICC
2008
IEEE
133views Communications» more  ICC 2008»
15 years 10 months ago
Memoryless Relay Strategies for Two-Way Relay Channels: Performance Analysis and Optimization
— We consider relaying strategies for two-way relay channels, where two terminals transmits simultaneously to each other with the help of relays. A memoryless system is considere...
Tao Cui, Jörg Kliewer
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Cascaded classification with optimal candidate selection for effective place recognition
A two-stage cascaded classification approach with an optimal candidate selection scheme is proposed to recognize places using images taken by camera phones. An optimal acceptance ...
Yiqun Li, Joo-Hwee Lim, Hanlin Goh
ICPP
2008
IEEE
15 years 10 months ago
On Clustering Tasks in IC-Optimal Dags
Strategies are developed for “fattening” the tasks of computation-dags so as to accommodate the heterogeneity of remote clients in Internet-based computing (IC). Earlier work ...
Mark Sims, Gennaro Cordasco, Arnold L. Rosenberg
ICPR
2008
IEEE
15 years 10 months ago
Robust recognition of 1-D barcodes using camera phones
In this paper we present an algorithm for the recognition of 1D barcodes using camera phones, which is highly robust regarding the the typical image distortions. We have created a...
Steffen Wachenfeld, Sebastian Terlunen, Xiaoyi Jia...