Zobrazeno 1 - 10
of 57
pro vyhledávání: '"J.G. Dunham"'
Publikováno v:
AsianHOST
This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers and IJTAG topology. The method protects IJTAG data with encryption. It further imposes access restriction on user control sequencing. In particular, it comple
Publikováno v:
GLOBECOM
Data security has always been a major concern and a huge challenge for governments and individuals throughout the world since early times. Recent advances in technology, such as the introduction of cloud computing, make it even a bigger challenge to
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
N.A. Mohamed, J.G. Dunham
Publikováno v:
IEEE Journal on Selected Areas in Communications. 20:248-256
A simple direct sequence-code division multiple access receiver that combines adaptive beamforming with parallel interference cancellation in a multipath fading channel is proposed and analyzed. A fast adaptation, conjugate gradient algorithm is used
Autor:
J.G. Dunham, Nermin A. Mohamed
Publikováno v:
Wireless Personal Communications. 20:251-265
An adaptive antenna array is incorporated into a decorrelating multi-user detector to effectively increase the DS-CDMA system capacity. Capacity improvement is due to beamforming gain, spatial diversity gain (assuming large angle spread), and the dec
Autor:
J.G. Dunham
Publikováno v:
IEEE transactions on pattern analysis and machine intelligence. 8(1)
Two-dimensional digital curves are often uniformly approximated by polygons or piecewise linear curves. Several algorithms have been proposed in the literature to find such curves. We present an algorithm that finds a piecewise linear curve with the
Autor:
Cheng-Chang Lu, J.G. Dunham
Publikováno v:
Pattern Recognition Letters. 14:945-949
A method for classifying closed planar shapes is presented. A shape is preprocessed and represented by several ordered sequences of vertices which are obtained by using polygon approximation algorithms with different approximation error criterions. A
Autor:
C.-C. Lu, J.G. Dunham
Publikováno v:
IEEE Transactions on Information Theory. 38:140-144
Given a set of training samples, the commonly used approach to determine a universal model is accomplished by averaging the statistics over all training samples. It is suggested to use average divergence as a measurement for the effectiveness of a un
Autor:
Cheng-Chang Lu, J.G. Dunham
Publikováno v:
IEEE Transactions on Communications. 39:1511-1514
The encoding schemes utilize the first- and second-order Markov models to describe the source structure. Two coding techniques, Huffman encoding and arithmetic encoding, are used to achieve a high coding efficiency. Universal code tables which match
Autor:
Chih-Chwen Chuang, J.G. Dunham
Publikováno v:
Advances in Cryptology-CRYPT0’ 90 ISBN: 9783540545088
CRYPTO
CRYPTO
A new matrix extension of the RSA algorithm is proposed which is based on the Cayley-Hamilton theorem and a one-way function. The security of this algorithm rests upon both that of the RSA algorithm and the one-way function. The computational efficie
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a6aa912bbd9fb2eb4024957b3a15d6c
https://doi.org/10.1007/3-540-38424-3_10
https://doi.org/10.1007/3-540-38424-3_10