Sciweavers

3116 search results - page 184 / 624
» Recovering
Sort
View
HOST
2009
IEEE
14 years 5 months ago
Local Heating Attacks on Flash Memory Devices
This paper shows how lasers can be used to implement modification attacks on EEPROM and Flash memory devices. This was achieved with inexpensive laser-diode module mounted on a mic...
Sergei P. Skorobogatov
ICASSP
2009
IEEE
14 years 5 months ago
Combining independent component analysis with geometric information and its application to speech processing
In this paper, we propose two approaches for combining geometric information with ICA algorithm to solve permutation problem under the scenario where a rough information about the...
Wenyi Zhang, Bhaskar D. Rao
ICASSP
2009
IEEE
14 years 5 months ago
Compressive sampling of pulse trains: Spread the spectrum!
In this paper we consider the problem of sampling far below the Nyquist rate signals that are sparse linear superpositions of shifts of a known, potentially wide-band, pulse. This...
Farid M. Naini, Rémi Gribonval, Laurent Jac...
ICASSP
2009
IEEE
14 years 5 months ago
Sparse source separation from orthogonal mixtures
This paper addresses source separation from a linear mixture under two assumptions: source sparsity and orthogonality of the mixing matrix. We propose efficient sparse separation...
Moshe Mishali, Yonina C. Eldar
ICASSP
2009
IEEE
14 years 5 months ago
Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery
— An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and colluder weight ...
Byung-Ho Cha, C.-C. Jay Kuo