Sciweavers

796 search results - page 158 / 160
» Spoofing prevention method
Sort
View
ICASSP
2011
IEEE
13 years 8 days ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
TASE
2011
IEEE
13 years 7 days ago
Fast Intersection-Free Offset Surface Generation From Freeform Models With Triangular Meshes
Abstract—A fast offset surface generation approach is presented in this paper to construct intersection-free offset surfaces, which preserve sharp features, from freeform triangu...
Shengjun Liu, Charlie C. L. Wang
CACM
2011
134views more  CACM 2011»
13 years 4 days ago
Brain-computer interfaces for communication and control
For many years people have speculated that electroencephalographic activity or other electrophysiological measures of brain function might provide a new non-muscular channel for s...
Dennis J. McFarland, Jonathan R. Wolpaw
INFOCOM
2011
IEEE
12 years 12 months ago
Experimental evaluation of optimal CSMA
Abstract—By ‘optimal CSMA’ we denote a promising approach to maximize throughput-based utility in wireless networks without message passing or synchronization among nodes. De...
Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi...
NAR
2011
216views Computer Vision» more  NAR 2011»
12 years 11 months ago
dbDNV: a resource of duplicated gene nucleotide variants in human genome
Gene duplications are scattered widely throughout the human genome. A single-base difference located in nearly identical duplicated segments may be misjudged as a single nucleotid...
Meng-Ru Ho, Kuo-Wang Tsai, Chun-houh Chen, Wen-cha...