Sciweavers

992 search results - page 178 / 199
» Transfer Function Fusing
Sort
View
JMM2
2007
96views more  JMM2 2007»
13 years 10 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
BC
2004
124views more  BC 2004»
13 years 10 months ago
Contribution of stretch reflexes to locomotor control: a modeling study
It is known that the springlike properties of muscles provide automatic load compensation during weight bearing. How crucial is sensory control of the motor output given these basi...
S. Yakovenko, V. Gritsenko, A. Prochazka
IEEEMM
2002
134views more  IEEEMM 2002»
13 years 10 months ago
A Middleware Architecture for Open and Interoperable GISs
an abstract model for information sharing and integration and use it to develop an architecture for building open, component-based, interoperable systems. A geographic information ...
Steven H. Wong, Steven L. Swartz, Dilip Sarkar
NN
2002
Springer
208views Neural Networks» more  NN 2002»
13 years 9 months ago
A spiking neuron model: applications and learning
This paper presents a biologically-inspired, hardware-realisable spiking neuron model, which we call the Temporal Noisy-Leaky Integrator (TNLI). The dynamic applications of the mo...
Chris Christodoulou, Guido Bugmann, Trevor G. Clar...
ACSAC
2010
IEEE
13 years 8 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou