Sciweavers

1597 search results - page 254 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
IJHR
2008
82views more  IJHR 2008»
13 years 7 months ago
A Team of Humanoid Game commentators
We present our work on creating a team of two humanoid robot commentators for soccer games of teams of four AIBO robots. The two humanoids stand on the side lines of the field, aut...
Manuela M. Veloso, Nicholas Armstrong-Crews, Sonia...
ICC
2000
IEEE
123views Communications» more  ICC 2000»
14 years 4 days ago
Design of Adaptive Bit Interleaved TCM for Rayleigh Fading Channels
fixed rate coding in terms of SNR and average throughput was obtained. In fact, the concept of variable rate adaptive In this paper, we propose a bandwidth efficient error cor- cod...
Vincent K. N. Lau
IPPS
2007
IEEE
14 years 2 months ago
Biomolecular Path Sampling Enabled by Processing in Network Storage
Computationally complex and data intensive atomic scale biomolecular simulation is enabled via Processing in Network Storage (PINS): a novel distributed system framework to overco...
Paul Brenner, Justin M. Wozniak, Douglas Thain, Aa...
ICIP
2010
IEEE
13 years 5 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
CN
2007
106views more  CN 2007»
13 years 7 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...