Sciweavers

3356 search results - page 609 / 672
» Determining Consensus Numbers
Sort
View
CCS
2003
ACM
14 years 28 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
CCS
2003
ACM
14 years 28 days ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
COCO
2003
Springer
162views Algorithms» more  COCO 2003»
14 years 28 days ago
Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness
We study the communication complexity of the set disjointness problem in the general multi-party model. For t players, each holding a subset of a universe of size n, we establish ...
Amit Chakrabarti, Subhash Khot, Xiaodong Sun
ESSMAC
2003
Springer
14 years 27 days ago
Joint Optimization of Wireless Communication and Networked Control Systems
Abstract. We consider a linear system, such as an estimator or a controller, in which several signals are transmitted over wireless communication channels. With the coding and medi...
Lin Xiao, Mikael Johansson, Haitham A. Hindi, Step...
ISMIR
2003
Springer
133views Music» more  ISMIR 2003»
14 years 26 days ago
Chord segmentation and recognition using EM-trained hidden markov models
Automatic extraction of content description from commercial audio recordings has a number of important applications, from indexing and retrieval through to novel musicological ana...
Alexander Sheh, Daniel P. W. Ellis