Sciweavers

305 search results - page 7 / 61
» Estimating the Numbers of End Users and End User Programmers
Sort
View
ISMIR
2001
Springer
146views Music» more  ISMIR 2001»
13 years 11 months ago
An Audio Front End for Query-by-Humming Systems
In this paper, the problem of processing audio signals is addressed in the context of query-by-humming systems. Since singing is naturally used as input, we aim to develop a front...
Emanuele Pollastri
ISW
2009
Springer
14 years 1 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
TMC
2012
11 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
COMPSAC
2005
IEEE
14 years 1 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...