Sciweavers

732 search results - page 124 / 147
» Power minimization using control generated clocks
Sort
View
ICASSP
2008
IEEE
14 years 3 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
WCNC
2008
IEEE
14 years 3 months ago
Distributed Energy Efficient Spectrum Access in Wireless Cognitive Radio Sensor Networks
—In this paper, a wireless cognitive radio sensor network is considered, where each sensor node is equipped with cognitive radio and the network is a multi-carrier system operati...
Song Gao, Lijun Qian, Dhadesugoor R. Vaman
CCS
2003
ACM
14 years 1 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
ICASSP
2011
IEEE
13 years 10 days ago
Modeling nodal prices in deregulated electricity markets in the usa: current practices and future needs
The purpose of this paper is to model the stochastic behavior of the nodal prices of electricity in deregulated markets in the USA, and in particular, to explain how this behavior...
Timothy D. Mount
MICCAI
2004
Springer
14 years 9 months ago
Enhancement of Visual Realism with BRDF for Patient Specific Bronchoscopy Simulation
Abstract. This paper presents a novel method for photorealistic rendering of the bronchial lumen by directly deriving matched shading and texture parameters from video bronchoscope...
Adrian James Chung, Fani Deligianni, Pallav Shah, ...