Sciweavers

848 search results - page 99 / 170
» Experiences from Combining Dialogue System Development with ...
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 5 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
ICMCS
2005
IEEE
103views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Using spatial cues for meeting speech segmentation
This work investigates the validity and accuracy of using spatial cues with Time-Delay Estimation (TDE) as a method of segmenting multichannel recorded speech by speaker location....
Eva Cheng, Jason Lukasiak, Ian S. Burnett, David S...
SC
2003
ACM
14 years 1 months ago
Traffic-based Load Balance for Scalable Network Emulation
Load balance is critical to achieving scalability for large network emulation studies, which are of compelling interest for emerging Grid, Peer to Peer, and other distributed appl...
Xin Liu, Andrew A. Chien
ICDIM
2007
IEEE
14 years 2 months ago
Accessibility and scalability in collaborative eCommerce environments
The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eComm...
Michel Khoury, Shervin Shirmohammadi
CSFW
2010
IEEE
13 years 11 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...