Sciweavers

217 search results - page 30 / 44
» Selecting Cryptographic Key Sizes
Sort
View
INFOCOM
1999
IEEE
14 years 8 days ago
Cache-Based Compaction: A New Technique for Optimizing Web Transfer
In this paper, we propose and study a new technique, which we call cache-based compaction for reducing the latency of Web browsing over a slow link. Our compaction technique trades...
Mun Choon Chan, Thomas Y. C. Woo
CSL
2008
Springer
13 years 8 months ago
Design and evaluation of prosodically-sensitive concatenative units for a Korean TTS system
This paper describes the design and evaluation of prosodically-sensitive concatenative units for a Korean text-to-speech (TTS) synthesis system. The diphones used are prosodically...
Kyuchul Yoon
JOC
2011
104views more  JOC 2011»
12 years 10 months ago
Short Undeniable Signatures Based on Group Homomorphisms
This paper is devoted to the design and analysis of short undeniable signatures based on a random oracle. Exploiting their online property, we can achieve signatures with a fully s...
Jean Monnerat, Serge Vaudenay
CACM
2000
130views more  CACM 2000»
13 years 7 months ago
Visual Generalization in Programming by Example
In Programming by Example [PBE, also sometimes called "Programming by Demonstration"] systems, the system records actions performed by a user in the interface, and produ...
Robert St. Amant, Henry Lieberman, Richard Potter,...
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 8 months ago
Evaluating and Improving Modern Variable and Revision Ordering Strategies in CSPs
A key factor that can dramatically reduce the search space during constraint solving is the criterion under which the variable to be instantiated next is selected. For this purpos...
Thanasis Balafoutis, Kostas Stergiou