Sciweavers

697 search results - page 108 / 140
» Granulation Operators on a Knowledge Base
Sort
View
ISMIR
2004
Springer
90views Music» more  ISMIR 2004»
14 years 2 months ago
Automatic extraction of music descriptors from acoustic signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the f...
François Pachet, Aymeric Zils
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
SAS
2004
Springer
14 years 2 months ago
Generalized Records and Spatial Conjunction in Role Logic
Role logic is a notation for describing properties of relational structures in shape analysis, databases and knowledge bases. A natural fragment of role logic corresponds to two-va...
Viktor Kuncak, Martin C. Rinard
WISA
2004
Springer
14 years 2 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 2 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao