Sciweavers

14 search results - page 2 / 3
» sec 2003
Sort
View
SEC
2003
13 years 6 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
SEC
2003
13 years 6 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
DICTA
2003
13 years 6 months ago
ECC Video - An Active Approach for Error Resilience
Video coding standards have incorporated various error resilience and error concealment tools, yet data losses during video transmission in mobile systems still pose big challenges...
Bing Du, Anthony J. Maeder, Miles Moody
DAC
2003
ACM
14 years 5 months ago
Random walks in a supply network
This paper presents a power grid analyzer based on a random walk technique. A linear-time algorithm is first demonstrated for DC analysis, and is then extended to perform transien...
Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
CICLING
2003
Springer
13 years 10 months ago
Total Lexicalism and GASGrammars: A Direct Way to Semantics
A new sort of generative grammar (Sec2) will be demonstrated which is more radically “lexicalist” than any earlier one (Sec1). It is a modified Unification Categorial Gramma...
Gábor Alberti, Katalin Balogh, Judit Kleibe...