Sciweavers

18493 search results - page 3439 / 3699
» Timers for Distributed Systems
Sort
View
TDP
2010
189views more  TDP 2010»
13 years 3 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TIP
2010
111views more  TIP 2010»
13 years 3 months ago
Green Noise Digital Halftoning With Multiscale Error Diffusion
Multiscale error diffusion (MED) is superior to conventional error diffusion algorithms as it can eliminate directional hysteresis completely and possesses a good blue noise chara...
Yik-Hing Fung, Yuk-Hee Chan
TIT
2010
97views Education» more  TIT 2010»
13 years 3 months ago
Why does the Kronecker model result in misleading capacity estimates?
Many recent works that study the performance of multi-input multi-output (MIMO) systems in practice assume a Kronecker model where the variances of the channel entries, upon decom...
Vasanthan Raghavan, Jayesh H. Kotecha, Akbar M. Sa...
TSP
2010
13 years 3 months ago
On the optimal performance in asymmetric gaussian wireless sensor networks with fading
We study the estimation of a Gaussian source by a Gaussian wireless sensor network (WSN) where L distributed sensors transmit noisy observations of the source through a fading Gau...
Hamid Behroozi, Fady Alajaji, Tamás Linder
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 3 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
« Prev « First page 3439 / 3699 Last » Next »