Sciweavers

13618 search results - page 2486 / 2724
» The Newton Operating System
Sort
View
150
Voted
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 10 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
GI
2007
Springer
15 years 10 months ago
Potentials and Requirements of Mobile Ubiquitous Computing for Public Transport
: Public transport plays an important role in our society which is characterized by mobility, individuality, comfort and ecological constraints. It is common opinion that public tr...
Holger Mügge, Karl-Heinz Lüke, Matthias ...
ICCS
2007
Springer
15 years 10 months ago
Enhanced Situational Awareness: Application of DDDAS Concepts to Emergency and Disaster Management
Abstract. We describe a prototype emergency and disaster information system designed and implemented using DDDAS concepts. The system is designed to use real-time cell phone callin...
Gregory R. Madey, Albert-László Bara...
MLMI
2007
Springer
15 years 10 months ago
To Separate Speech
The PASCAL Speech Separation Challenge (SSC) is based on a corpus of sentences from the Wall Street Journal task read by two speakers simultaneously and captured with two circular ...
John W. McDonough, Ken'ichi Kumatani, Tobias Gehri...
140
Voted
PAM
2007
Springer
15 years 10 months ago
Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware
Abstract. Tracing traffic using commodity hardware in contemporary highspeed access or aggregation networks such as 10-Gigabit Ethernet is an increasingly common yet challenging t...
Fabian Schneider, Jörg Wallerich, Anja Feldma...
« Prev « First page 2486 / 2724 Last » Next »