Sciweavers

397 search results - page 37 / 80
» The Threshold of Event Simultaneity
Sort
View
JCSC
2002
129views more  JCSC 2002»
13 years 9 months ago
Leakage Current Reduction in VLSI Systems
There is a growing need to analyze and optimize the stand-by component of power in digital circuits designed for portable and battery-powered applications. Since these circuits re...
David Blaauw, Steven M. Martin, Trevor N. Mudge, K...
BMCBI
2011
13 years 4 months ago
Tiling array data analysis: a multiscale approach using wavelets
Background: Tiling array data is hard to interpret due to noise. The wavelet transformation is a widely used technique in signal processing for elucidating the true signal from no...
Alexander Karpikov, Joel S. Rozowsky, Mark Gerstei...
TIFS
2010
130views more  TIFS 2010»
13 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TIT
2010
137views Education» more  TIT 2010»
13 years 4 months ago
Average case analysis of multichannel sparse recovery using convex relaxation
This paper considers recovery of jointly sparse multichannel signals from incomplete measurements. Several approaches have been developed to recover the unknown sparse vectors from...
Yonina C. Eldar, Holger Rauhut
MOBIHOC
2005
ACM
14 years 9 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....