Sciweavers

347 search results - page 39 / 70
» Overview of INEX 2005
Sort
View
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
NOLISP
2005
Springer
14 years 1 months ago
Advanced Methods for Glottal Wave Extraction
Abstract. Glottal inverse filtering is a technique used to derive the glottal waveform during voiced speech. Closed phase inverse filtering (CPIF) is a common approach for achiev...
Jacqueline Walker, Peter J. Murphy
PADL
2005
Springer
14 years 1 months ago
Safe Programming with Pointers Through Stateful Views
The need for direct memory manipulation through pointers is essential in many applications. However, it is also commonly understood that the use (or probably misuse) of pointers is...
Dengping Zhu, Hongwei Xi
PET
2005
Springer
14 years 1 months ago
Privacy Issues in Vehicular Ad Hoc Networks
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private ...
Florian Dötzer
PPAM
2005
Springer
14 years 1 months ago
Towards Distributed Monitoring and Performance Analysis Services in the K-WfGrid Project
The complexity and the dynamics of the Grid environment and of the emering workflow-based applications on the Grid require novel performance monitoring and analysis services in or...
Hong Linh Truong, Bartosz Balis, Marian Bubak, Jak...