Sciweavers

121 search results - page 6 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
ICSE
2009
IEEE-ACM
14 years 4 months ago
SemDiff: Analysis and recommendation support for API evolution
As a framework evolves, changes in its Application Programming Interface (API) can break client programs that extend the framework. Repairing a client program can be a challenging...
Barthélémy Dagenais, Martin P. Robil...
ICMCS
2007
IEEE
183views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Web Page Segmentation Based on Gestalt Theory
Automatic web page segmentation is the basis to adaptive web browsing on mobile devices. It breaks a large page into smaller blocks, in which contents with coherent semantics are ...
Peifeng Xiang, Xin Yang, Yuanchun Shi
CLUSTER
2006
IEEE
14 years 3 months ago
A New Flexible MPI Collective I/O Implementation
The MPI-IO standard creates a huge opportunity to break out of the traditional file system I/O methods. As a software layer between the user and the file system, an MPI-IO libra...
Kenin Coloma, Avery Ching, Alok N. Choudhary, Wei-...
TSD
2005
Springer
14 years 3 months ago
Diction Based Prosody Modeling in Table-to-Speech Synthesis
Transferring a structure from the visual modality to the aural one presents a difficult challenge. In this work we are experimenting with prosody modeling for the synthesized speec...
Dimitris Spiliotopoulos, Gerasimos Xydas, Georgios...