Sciweavers

1594 search results - page 163 / 319
» Sampling and Reconstruction of Operators
Sort
View
TSP
2008
178views more  TSP 2008»
13 years 9 months ago
Digital Computation of Linear Canonical Transforms
Abstract--We deal with the problem of efficient and accurate digital computation of the samples of the linear canonical transform (LCT) of a function, from the samples of the origi...
A. Koc, Haldun M. Özaktas, Cagatay Candan, M....
IGARSS
2009
13 years 7 months ago
General Framework on Change Detection in a Sparse Domain
The paper presents a general framework for change detection in radar images, for an operational purpose and in the context of environmental monitoring. This framework is based on ...
Abdourrahmane M. Atto, Grégoire Mercier, Do...
IGARSS
2010
13 years 4 months ago
The microasar experiment on CASIE-09
During the summer of 2009, the Characterization of Arctic Sea Ice Experiment 2009 (CASIE-09) operated a small, unmanned aircraft system (UAS) over the Arctic Ocean for a number of ...
David G. Long, Evan C. Zaugg, Matthew C. Edwards, ...
INFOCOM
2011
IEEE
13 years 28 days ago
Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints
— We consider a peer-to-peer network where nodes can send and receive files amongst their peers. File requests are generated randomly, and each new file can correspond to a dif...
Michael J. Neely, Leana Golubchik
USENIX
2007
13 years 11 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...