Sciweavers

2354 search results - page 420 / 471
» Tracking Stopping Times
Sort
View
140
Voted
TC
2008
15 years 3 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
132
Voted
TSMC
2008
138views more  TSMC 2008»
15 years 3 months ago
Fast Diagnosis With Sensors of Uncertain Quality
This correspondence presents an approach to the detection and isolation of component failures in large-scale systems. In the case of sensors that report at rates of 1 Hz or less, t...
Ozgur Erdinc, Craig Brideau, Peter Willett, Thiaga...
137
Voted
TIT
1998
121views more  TIT 1998»
15 years 3 months ago
Blind Multiuser Detection: A Subspace Approach
—A new multiuser detection scheme based on signal subspace estimation is proposed. It is shown that under this scheme, both the decorrelating detector and the linear minimummean-...
Xiaodong Wang, H. Vincent Poor
123
Voted
TON
2002
138views more  TON 2002»
15 years 3 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
172
Voted
APGV
2009
ACM
268views Visualization» more  APGV 2009»
15 years 7 months ago
Saliency maps of high dynamic range images
A number of computational models of visual attention have been proposed based on the concept of saliency map, most of them validated using oculometric data. They are widely used fo...
Josselin Petit, Roland Brémond, Jean-Philip...