Sciweavers

5246 search results - page 1036 / 1050
» Sanitization models and their limitations
Sort
View
PE
2002
Springer
158views Optimization» more  PE 2002»
13 years 9 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
TAPOS
1998
93views more  TAPOS 1998»
13 years 9 months ago
Object Acquaintance Selection and Binding
Large object-oriented systems have, at least, four characteristics that complicate object communication, i.e the system is distributed and contains large numbers, e.g. thousands, ...
Jan Bosch
TIP
1998
240views more  TIP 1998»
13 years 9 months ago
DCT-based motion estimation
—We propose novel discrete cosine transform (DCT) pseudophase techniques to estimate shift/delay between two onedimensional (1-D) signals directly from their DCT coefficients by...
Ut-Va Koc, K. J. Ray Liu
TIT
1998
112views more  TIT 1998»
13 years 9 months ago
Application of Network Calculus to Guaranteed Service Networks
—We use recent network calculus results to study some properties of lossless multiplexing as it may be used in guaranteed service networks. We call network calculus a set of resu...
Jean-Yves Le Boudec
TASLP
2002
143views more  TASLP 2002»
13 years 9 months ago
Distributed speech processing in miPad's multimodal user interface
This paper describes the main components of MiPad (Multimodal Interactive PAD) and especially its distributed speech processing aspects. MiPad is a wireless mobile PDA prototype th...
Li Deng, Kuansan Wang, Alex Acero, Hsiao-Wuen Hon,...
« Prev « First page 1036 / 1050 Last » Next »