Sciweavers

3096 search results - page 522 / 620
» Theory and Use of the EM Algorithm
Sort
View
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 8 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
JCP
2006
128views more  JCP 2006»
13 years 8 months ago
A Service Oriented Framework for Multimedia Radio Networks
- In order to enable fast deployment of new emerging services over multimedia radio networks, it is important to design an efficient service-based platform with necessary traffic m...
Asma Ben Letaifa, Sami Tabbane, Zièd Chouka...
JSAC
2006
111views more  JSAC 2006»
13 years 8 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JSAC
2006
128views more  JSAC 2006»
13 years 8 months ago
Optimized Transmission for Fading Multiple-Access and Broadcast Channels With Multiple Antennas
In mobile wireless networks, dynamic allocation of resources such as transmit powers, bit-rates, and antenna beams based on the channel state information of mobile users is known t...
Mehdi Mohseni, Rui Zhang, John M. Cioffi
NJC
2006
86views more  NJC 2006»
13 years 8 months ago
Structured Formal Development in Isabelle
Abstract. General purpose theorem provers provide advanced facilities for proving properties about specifications, and may therefore be a valuable tool in formal program developmen...
Maksym Bortin, Einar Broch Johnsen, Christoph L&uu...