Sciweavers

1449 search results - page 213 / 290
» Secure and Efficient Metering
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
13 years 4 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
MOC
2010
13 years 4 months ago
Analysis of a finite PML approximation to the three dimensional elastic wave scattering problem
We consider the application of a perfectly matched layer (PML) technique to approximate solutions to the elastic wave scattering problem in the frequency domain. The PML is viewed ...
James H. Bramble, Joseph E. Pasciak, Dimitar Trene...
PR
2010
141views more  PR 2010»
13 years 4 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
SPIC
2010
13 years 4 months ago
Successive refinement based Wyner-Ziv video compression
Wyner-Ziv coding enables low complexity video encoding with the motion estimation procedure shifted to the decoder. However, the accuracy of decoder motion estimation is often low...
Xiaopeng Fan, Oscar C. Au, Ngai-Man Cheung, Yan Ch...
SPIC
2010
13 years 4 months ago
Attention-based video streaming
This paper presents a complete framework for attention-based video streaming for low bandwidth networks. First, motivated by the fovea-periphery distinction of biological vision s...
Çagatay Dikici, H. Isil Bozma