Sciweavers

12052 search results - page 2162 / 2411
» computer 2010
Sort
View
CISS
2010
IEEE
13 years 2 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
CISS
2010
IEEE
13 years 2 months ago
Compressive sampling for streaming signals with sparse frequency content
Abstract—Compressive sampling (CS) has emerged as significant signal processing framework to acquire and reconstruct sparse signals at rates significantly below the Nyquist rate...
Petros Boufounos, M. Salman Asif
CISS
2010
IEEE
13 years 2 months ago
On performance evaluation of cooperative spectrum sensing in cognitive radio networks
—This paper presents the system level performance evaluation for energy-detection based cooperative spectrum sensing in cognitive radio networks. Three performance criteria are q...
Gang Xiong, Shalinee Kishore, Aylin Yener
AI
2011
Springer
13 years 2 months ago
Parallelizing a Convergent Approximate Inference Method
Probabilistic inference in graphical models is a prevalent task in statistics and artificial intelligence. The ability to perform this inference task efficiently is critical in l...
Ming Su, Elizabeth Thompson
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
13 years 2 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
« Prev « First page 2162 / 2411 Last » Next »