Sciweavers

1805 search results - page 90 / 361
» Understanding Code Mobility
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
MOBILIGHT
2010
13 years 8 months ago
Spectral Efficiency Using Combinations of Transmit Antenna Selection with Linear Dispersion Code Selection
In this paper the objective is to enhance the spectral efficiency using combinations of transmit antenna selection with Linear Dispersion Code Selection. Both bit error rate minimi...
Ismael Gutiérrez, Faouzi Bader
ICMCS
2007
IEEE
79views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Pop Music Beat Detection in the Huffman Coded Domain
This paper presents a novel beat detector that operates in the Huffman coded domain of a MP3 audio bitstream. We seek to answer two main questions. First, whether it is possible t...
Jia Zhu, Ye Wang
DARE
2000
182views more  DARE 2000»
13 years 11 months ago
CyberCode: designing augmented reality environments with visual tags
The CyberCode is a visual tagging system based on a 2Dbarcode technology and provides several features not provided by other tagging systems. CyberCode tags can be recognized by t...
Jun Rekimoto, Yuji Ayatsuka
PERCOM
2007
ACM
14 years 9 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan