Sciweavers

1580 search results - page 160 / 316
» Non-Interference Through Determinism
Sort
View
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
14 years 4 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
CVPR
2008
IEEE
14 years 4 months ago
The statistical modelling of fingerprint minutiae distribution with implications for fingerprint individuality studies
The spatial distribution of fingerprint minutiae is a core problem in the fingerprint individuality study, the cornerstone of the fingerprint authentication technology. Previously...
Jiansheng Chen, Yiu Sang Moon
DASFAA
2008
IEEE
109views Database» more  DASFAA 2008»
14 years 4 months ago
Discovering Spatial Interaction Patterns
Abstract. Advances in sensing and satellite technologies and the growth of Internet have resulted in the easy accessibility of vast amount of spatial data. Extracting useful knowle...
Chang Sheng, Wynne Hsu, Mong Lee, Anthony K. H. Tu...
DATE
2008
IEEE
110views Hardware» more  DATE 2008»
14 years 4 months ago
Run-time System for an Extensible Embedded Processor with Dynamic Instruction Set
One of the upcoming challenges in embedded processing is to incorporate an increasing amount of adaptivity in order to respond to the multifarious constraints induced by today’s...
Lars Bauer, Muhammad Shafique, Stephanie Kreutz, J...
ICCCN
2008
IEEE
14 years 4 months ago
Localized Access Point Association in Wireless LANs with Bounded Approximation Ratio
— The current access point (AP) association schemes in wireless LANs, such as IEEE 802.11, cause an unbalanced load which reduces the performance of both the entire network and i...
Mingming Lu, Jie Wu