Sciweavers

881 search results - page 92 / 177
» A Model of Tolerance
Sort
View
ASIACRYPT
2000
Springer
15 years 1 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
WORDS
2005
IEEE
15 years 3 months ago
Error Recovery for a Boiler System with OTS PID Controller
We have previously presented initial results of a case study which illustrated an approach to engineering protective wrappers as a means of detecting errors or unwanted behaviour ...
Tom Anderson, Mei Feng, Steve Riddle, Alexander Ro...
ICCBSS
2003
Springer
15 years 3 months ago
Protective Wrapper Development: A Case Study
We have recently proposed a general approach to engineering protective wrappers as a means of detecting errors or unwanted behaviour in systems employing an OTS (Off-The-Shelf) ite...
Tom Anderson, Mei Feng, Steve Riddle, Alexander B....
INTERSPEECH
2010
14 years 4 months ago
Autoregressive clustering for HMM speech synthesis
The autoregressive HMM has been shown to provide efficient parameter estimation and high-quality synthesis, but in previous experiments decision trees derived from a non-autoregre...
Matt Shannon, William Byrne
MOBISYS
2010
ACM
15 years 5 days ago
Augmenting mobile 3G using WiFi
We investigate if WiFi access can be used to augment 3G capacity in mobile environments. We first conduct a detailed study of 3G and WiFi access from moving vehicles, in three dif...
Aruna Balasubramanian, Ratul Mahajan, Arun Venkata...