Sciweavers

CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 8 months ago
A constructive and unifying framework for zero-bit watermarking
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in a piece of content. The watermark detector checks ...
Teddy Furon
CORR
2006
Springer
72views Education» more  CORR 2006»
13 years 8 months ago
A secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signa...
Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
CORR
2006
Springer
82views Education» more  CORR 2006»
13 years 8 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 8 months ago
Belief Calculus
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 8 months ago
Imagination as Holographic Processor for Text Animation
Vadim Astakhov, Tamara Astakhova, Brian Sanders
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 8 months ago
Performance Analysis of Iterative Channel Estimation and Multiuser Detection in Multipath DS-CDMA Channels
Abstract--This paper examines the performance of decisionfeedback-based iterative channel estimation and multiuser detection in channel coded aperiodic direct sequence code divisio...
Husheng Li, Sharon M. Betz, H. Vincent Poor
CORR
2006
Springer
136views Education» more  CORR 2006»
13 years 8 months ago
On the Capacity of Multiple Access Channels with State Information and Feedback
In this correspondence, the multiple access channel (MAC) with channel state is analyzed in a scenario where a) the channel state is known non-causally to the transmitters and b) t...
Wei Wu, Sriram Vishwanath, Ari Arapostathis
CORR
2006
Springer
101views Education» more  CORR 2006»
13 years 8 months ago
Foundations of Modern Language Resource Archives
A number of serious reasons will convince an increasing amount of researchers to store their relevant material in centers which we will call "language resource archives"...
Peter Wittenburg, Daan Broeder, Wolfgang Klein, St...
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 8 months ago
Modeling Aspect Mechanisms: A Top-Down Approach
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
Sergei Kojarski, David H. Lorenz
CORR
2006
Springer
86views Education» more  CORR 2006»
13 years 8 months ago
Mining Behavioral Groups in Large Wireless LANs
Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy