Sciweavers

14 search results - page 3 / 3
» Understanding when location-hiding using overlay networks is...
Sort
View
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
11 years 7 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
IMC
2009
ACM
13 years 11 months ago
Live streaming performance of the Zattoo network
A number of commercial peer-to-peer systems for live streaming, such as PPLive, Joost, LiveStation, SOPCast, TVants, etc. have been introduced in recent years. The behavior of the...
Hyunseok Chang, Sugih Jamin, Wenjie Wang
ICSE
2009
IEEE-ACM
14 years 6 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
IJPRAI
2000
135views more  IJPRAI 2000»
13 years 5 months ago
Towards Unrestricted Lip Reading
Lip reading provides useful information in speech perception and language understanding, especially when the auditory speech is degraded. However, many current automatic lip readi...
Uwe Meier, Rainer Stiefelhagen, Jie Yang, Alex Wai...