Sciweavers

2184 search results - page 359 / 437
» Modeling and Realizing Interoperability
Sort
View
ASIACRYPT
2007
Springer
14 years 2 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton
CLEAR
2007
Springer
136views Biometrics» more  CLEAR 2007»
14 years 2 months ago
The ISL RT-07 Speech-to-Text System
Abstract. This paper describes the 2007 meeting speech-to-text system for lecture rooms developed at the Interactive Systems Laboratories (ISL), for the multiple distant microphone...
Matthias Wölfel, Sebastian Stüker, Flori...
ECTEL
2007
Springer
14 years 2 months ago
Mobile Social Software with Context Awareness and Data Uncertainty for Technology-Enhanced Learning
Mobile computing technologies and social software have given new challenges to technology-enhanced learning. Simple e-learning system personalization, adaptation and authoring beco...
Yiwei Cao
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 1 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
IFIP
2007
Springer
14 years 1 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...