Sciweavers

239 search results - page 24 / 48
» Object substitution masking
Sort
View
CODES
2004
IEEE
13 years 11 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
EJASMP
2010
114views more  EJASMP 2010»
13 years 2 months ago
Wide-Band Audio Coding Based on Frequency-Domain Linear Prediction
In this paper, we re-visit an original concept of speech coding in which the signal is separated into the carrier modulated by the signal envelope. A recently developed technique, ...
Petr Motlícek, Sriram Ganapathy, Hynek Herm...
TASLP
2010
96views more  TASLP 2010»
13 years 2 months ago
Evaluating Source Separation Algorithms With Reverberant Speech
This paper examines the performance of several source separation systems on a speech separation task for which human intelligibility has previously been measured. For anechoic mixt...
Michael I. Mandel, S. Bressler, Barbara G. Shinn-C...
CGO
2006
IEEE
13 years 11 months ago
Space-Efficient 64-bit Java Objects through Selective Typed Virtual Addressing
Memory performance is an important design issue for contemporary systems given the ever increasing memory gap. This paper proposes a space-efficient Java object model for reducing...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
14 years 23 days ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway