Sciweavers

2421 search results - page 436 / 485
» Message from the Editor-in-Chief
Sort
View
CSL
2007
Springer
13 years 8 months ago
Accessing speech data using strategic fixation
When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ...
Steve Whittaker, Julia Hirschberg
PERCOM
2008
ACM
13 years 8 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
SAC
2006
ACM
13 years 8 months ago
High performance XSL-FO rendering for variable data printing
High volume print jobs are getting more common due to the growing demand for personalized documents. In this context, Variable Data Printing (VDP) has become a useful tool for mar...
Fabio Giannetti, Luiz Gustavo Fernandes, Rogerio T...
IJDE
2007
105views more  IJDE 2007»
13 years 8 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
TIT
2008
164views more  TIT 2008»
13 years 8 months ago
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes
We investigate the decoding problem of Reed-Solomon (RS) Codes, also known as the Polynomial Reconstruction Problem (PR), from a cryptographic hardness perspective. Namely, we dea...
Aggelos Kiayias, Moti Yung