Sciweavers

796 search results - page 126 / 160
» Spoofing prevention method
Sort
View
TIP
2011
231views more  TIP 2011»
13 years 4 months ago
Variational Bayesian Super Resolution
—In this paper, we address the super resolution (SR) problemfromasetofdegradedlowresolution(LR)imagestoobtain a high resolution (HR) image. Accurate estimation of the sub-pixel m...
S. Derin Babacan, Rafael Molina, Aggelos K. Katsag...
ICASSP
2011
IEEE
13 years 1 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
ICASSP
2011
IEEE
13 years 1 months ago
Topic-sensitive interactive image object retrieval with noise-proof relevance feedback
One current direction to enhance the search accuracy in visual object retrieval is to reformulate the original query through (pseudo-)relevance feedback, which augments a query wi...
Jen-Hao Hsiao, Henry Chang
INFOCOM
2011
IEEE
13 years 1 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
ASUNAM
2011
IEEE
12 years 10 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...