Sciweavers

252 search results - page 23 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
ETT
2000
103views Education» more  ETT 2000»
13 years 8 months ago
Analysis of Doppler Spread Perturbations in OFDM(A) Systems
We analyze the effects of Doppler spread in mobile channels on Orthogonal Frequency Division Multiplex (OFDM) systems. This is important, since channel variations during one OFDM s...
Patrick Robertson, Stefan Kaiser
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
14 years 2 months ago
Optimizing sequential cycles through Shannon decomposition and retiming
—Optimizing sequential cycles is essential for many types of high-performance circuits, such as pipelines for packet processing. Retiming is a powerful technique for speeding pip...
Cristian Soviani, Olivier Tardieu, Stephen A. Edwa...
CSREASAM
2006
13 years 10 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
TCOS
2010
13 years 3 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
ICML
2003
IEEE
14 years 9 months ago
Semi-Supervised Learning of Mixture Models
This paper analyzes the performance of semisupervised learning of mixture models. We show that unlabeled data can lead to an increase in classification error even in situations wh...
Fabio Gagliardi Cozman, Ira Cohen, Marcelo Cesar C...