Sciweavers

274 search results - page 22 / 55
» Universal extensions to simulate specifications
Sort
View
AHS
2006
IEEE
127views Hardware» more  AHS 2006»
13 years 11 months ago
Using Hardware-Based Particle Swarm Method for Dynamic Optimization of Adaptive Array Antennas
The following article describes and discusses the suitability of the particle swarm optimization (PSO) for the employment with blind adaptation of the directional characteristic o...
Gabriella Kókai, Tonia Christ, Hans Holm Fr...
IJNSEC
2010
151views more  IJNSEC 2010»
13 years 2 months ago
Performance Evaluation of Mobility Speed over MANET Routing Protocols
Ad-hoc networking is a concept in computer communications. Each node participating in the network acts both as host and a router and must therefore is willing to forward packets f...
Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, A...
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 1 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
IWDW
2007
Springer
14 years 1 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
ISVC
2007
Springer
14 years 1 months ago
Fitting the World to the Mind: Transforming Images to Mimic Perceptual Adaptation
Abstract. Visual sensitivity is constantly adjusting to the current visual context through processes of adaptation. These adaptive changes strongly affect all perceptual judgments ...
Michael A. Webster, Kyle McDermott, George Bebis