Sciweavers

1273 search results - page 197 / 255
» Recovery from
Sort
View
INFOCOM
2000
IEEE
14 years 16 days ago
Energy Efficient Battery Management
Abstract—A challenging aspect of mobile communications consists in exploring ways in which the available run time of terminals can be maximized. In this paper, we present a detai...
Carla-Fabiana Chiasserini, Ramesh R. Rao
FGR
2011
IEEE
288views Biometrics» more  FGR 2011»
12 years 11 months ago
Facial action unit recognition with sparse representation
This paper presents a novel framework for recognition of facial action unit (AU) combinations by viewing the classification as a sparse representation problem. Based on this framew...
Mohammad H. Mahoor, Mu Zhou, Kevin L. Veon, Seyed ...
DAGM
2010
Springer
13 years 9 months ago
Exploiting Redundancy for Aerial Image Fusion Using Convex Optimization
Abstract. Image fusion in high-resolution aerial imagery poses a challenging problem due to fine details and complex textures. In particular, color image fusion by using virtual or...
Stefan Kluckner, Thomas Pock, Horst Bischof
CCS
2005
ACM
14 years 1 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 8 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...