Sciweavers

1610 search results - page 310 / 322
» Identity Based Multisignatures
Sort
View
ICPR
2002
IEEE
14 years 1 months ago
Virtual Audio System Customization Using Visual Matching of Ear Parameters
Applications in the creation of virtual auditory spaces (VAS) and sonification require individualized head related transfer functions (HRTFs) for perceptual fidelity. HRTFs exhi...
Dmitry N. Zotkin, Ramani Duraiswami, Larry S. Davi...
ECMDAFA
2010
Springer
238views Hardware» more  ECMDAFA 2010»
14 years 1 months ago
eSPEM - A SPEM Extension for Enactable Behavior Modeling
OMG’s SPEM – by means of its (semi-)formal notation – allows for a detailed description of development processes and methodologies, but can only be used for a rather coarse d...
Ralf Ellner, Samir Al-Hilank, Johannes Drexler, Ma...
AIMS
2009
Springer
14 years 1 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
EUROPAR
2001
Springer
14 years 28 days ago
Building TMR-Based Reliable Servers Despite Bounded Input Lifetimes
This paper is on the construction of a server subsystem in a client/server system in an application context where the number of potential clients can be arbitrarily large. The imp...
Paul D. Ezhilchelvan, Jean-Michel Hélary, M...
SCALESPACE
2001
Springer
14 years 26 days ago
Scale-Time Kernels and Models
Receptive field sensitivity profiles of visual front-end cells in the LGN and V1 area in intact animals can be measured with increasing accuracy, both in the spatial and temporal...
Bart M. ter Haar Romeny, Luc Florack, Mads Nielsen