Sciweavers

85 search results - page 14 / 17
» Spectral Techniques for Expander Codes
Sort
View
TOCS
2002
70views more  TOCS 2002»
13 years 8 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
ICBA
2004
Springer
197views Biometrics» more  ICBA 2004»
14 years 1 months ago
Maximum Likelihood and Maximum a Posteriori Adaptation for Distributed Speaker Recognition Systems
We apply the ETSI’s DSR standard to speaker verification over telephone networks and investigate the effect of extracting spectral features from different stages of the ETSI...
Chin-Hung Sit, Man-Wai Mak, Sun-Yuan Kung
JSAC
2006
133views more  JSAC 2006»
13 years 8 months ago
Code-aided joint channel and frequency offset estimation for DS-CDMA
This paper deals with joint data detection, synchronization and channel parameter estimation for Direct-Sequence Code Division Multiple Access (DS-CDMA) systems over frequency sel...
Mamoun Guenach, Frederik Simoens, Henk Wymeersch, ...
TSP
2008
118views more  TSP 2008»
13 years 8 months ago
A Block Component Model-Based Blind DS-CDMA Receiver
In this paper, we consider the problem of blind multiuser separation-equalization in the uplink of a wideband DS-CDMA system, in a multipath propagation environment with intersymbo...
Dimitri Nion, Lieven De Lathauwer