Sciweavers

11588 search results - page 2166 / 2318
» Will They Like This
Sort
View
COMPSEC
2008
111views more  COMPSEC 2008»
13 years 9 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 9 months ago
Active Learning for Hidden Attributes in Networks
In many networks, vertices have hidden attributes that are correlated with the network's topology. For instance, in social networks, people are more likely to be friends if t...
Xiaoran Yan, Yaojia Zhu, Jean-Baptiste Rouquier, C...
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 9 months ago
Full vectoring optimal power allocation in xDSL channels under per-modem power constraints and spectral mask constraints
In xDSL systems, crosstalk can be separated into two categories, namely in-domain crosstalk and out-of-domain crosstalk. Indomain crosstalk is also refered to as self crosstalk. Ou...
Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun...
CONNECTION
2008
178views more  CONNECTION 2008»
13 years 9 months ago
Spoken language interaction with model uncertainty: an adaptive human-robot interaction system
Spoken language is one of the most intuitive forms of interaction between humans and agents. Unfortunately, agents that interact with people using natural language often experienc...
Finale Doshi, Nicholas Roy
« Prev « First page 2166 / 2318 Last » Next »