Sciweavers

13618 search results - page 2469 / 2724
» The Newton Operating System
Sort
View
BWCCA
2010
14 years 11 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
NPAR
2010
ACM
15 years 9 months ago
Sisley the abstract painter
We present an interactive abstract painting system named Sisley. Sisley works upon the psychological principle [Berlyne 1971] that abstract arts are often characterized by their gr...
Mingtian Zhao, Song Chun Zhu
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 8 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
ICASSP
2011
IEEE
14 years 8 months ago
Distributed one bit feedback extended orthogonal space time coding based on selection of cyclic rotation for cooperative relay n
In this paper, a novel closed-loop distributed extended orthogonal space time block code (D-EO-STBC) with one-bit feedback based on selection of phase rotation is proposed for two...
Abdulghani M. Elazreg, Jonathon A. Chambers
ICASSP
2011
IEEE
14 years 8 months ago
Detection of targets embedded in multipath clutter with Time Reversal
—Detection of targets in complex environments is of importance in both radar and sonar applications. Recent work has shown that the use of Time Reversal (TR) techniques improves ...
Nicholas O'Donoughue, Joel Harley, José M. ...
« Prev « First page 2469 / 2724 Last » Next »