Sciweavers

5355 search results - page 104 / 1071
» Modules
Sort
View
IJACTAICIT
2010
99views more  IJACTAICIT 2010»
13 years 3 months ago
Utilizing Trusted Platform Module to Mitigate Botnet Attacks
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing ...
Muththolib Sidheeq, Ali Dehghantanha, Geetha Kanan...
TIM
2010
108views Education» more  TIM 2010»
13 years 3 months ago
Reversible Watermarking by Modulation and Security Enhancement
This paper presents a watermarking algorithm that is suitable for the data represented in floating- or fixed-point numbers. By keeping the modulation information, every value in th...
Hao-Tian Wu, Yiu-ming Cheung
TIT
2010
103views Education» more  TIT 2010»
13 years 3 months ago
Codes in permutations and error correction for rank modulation
Codes for rank modulation have been recently proposed as a means of protecting flash memory devices from errors. We study basic coding theoretic problems for such codes, representi...
Alexander Barg, Arya Mazumdar
ICASSP
2011
IEEE
13 years 23 days ago
Spectral subtraction on real and imaginary modulation spectra
In this paper, we propose a novel phase preserving spectral subtraction method for enhancing speech in noise. Instead of the conventional approach of carrying out subtraction on t...
Yi Zhang, Yunxin Zhao
ICASSP
2011
IEEE
13 years 23 days ago
Extended array method for detection and direction finding of a weak linear frequency modulated signal
A well known computationally efficient method for parameters estimation of linear frequency modulated (LFM) signals is to mix the received signals with a shifted version of itsel...
Songsri Sirianunpiboon