Sciweavers

2028 search results - page 81 / 406
» Deriving Relation Keys from XML Keys
Sort
View
145
Voted
ICC
2011
IEEE
193views Communications» more  ICC 2011»
14 years 3 months ago
Narrow- and Broadband Interference Robustness for OOK/BPPM Based Energy Detection
Abstract—An analysis of narrow- and broadband interference robustness within an On-Off Keying/Binary Pulse Position Modulation based noncoherent multiband impulse radio ultrawide...
Hanns-Ulrich Dehner, Holger Jäkel, Friedrich ...
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
CSL
2007
Springer
15 years 4 months ago
Stochastic and syntactic techniques for predicting phrase breaks
Determining the position of breaks in a sentence is a key task for a text-to-speech (TTS) system. We describe some methods for phrase break prediction in which the whole sentence ...
Ian Read, Stephen Cox
JTAER
2008
118views more  JTAER 2008»
15 years 2 months ago
Service and Document Based Interoperability for European eCustoms Solutions
Innovative eCustoms solutions play an important role in the pan-European eGovernment strategy. The underlying premise is interoperability postulating a common understanding of pro...
Tobias Vogel, Alexander Schmidt, Alexander Lemm, H...
GLVLSI
2007
IEEE
166views VLSI» more  GLVLSI 2007»
15 years 8 months ago
Efficient pipelining for modular multiplication architectures in prime fields
This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation o...
Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid...