Sciweavers

2517 search results - page 358 / 504
» Secure Deployment of Components
Sort
View
SDMW
2010
Springer
13 years 7 months ago
Joining Privately on Outsourced Data
In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients ar...
Bogdan Carbunar, Radu Sion
TRUSTBUS
2010
Springer
13 years 7 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
SPEECH
2011
13 years 4 months ago
A multistage approach to blind separation of convolutive speech mixtures
We propose a novel algorithm for the separation of convolutive speech mixtures using two-microphone recordings, based on the combination of independent component analysis (ICA) an...
Tariqullah Jan, Wenwu Wang, DeLiang Wang
SPEECH
2011
13 years 4 months ago
Role of modulation magnitude and phase spectrum towards speech intelligibility
In this paper our aim is to investigate the properties of the modulation domain and more specifically, to evaluate the relative contributions of the modulation magnitude and phas...
Kuldip K. Paliwal, Belinda Schwerin, Kamil K. W&oa...
TSE
2010
230views more  TSE 2010»
13 years 3 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...