Sciweavers

712 search results - page 109 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
DIMVA
2011
14 years 1 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
IEEEIAS
2007
IEEE
15 years 4 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
SPEECH
2010
96views more  SPEECH 2010»
14 years 4 months ago
Non-native durational patterns decrease speech intelligibility
In native speech, durational patterns convey linguistically relevant phenomena such as phrase structure, lexical stress, rhythm, and word boundaries. The lower intelligibility of ...
Hugo Quené, L. E. van Delft
SPEECH
2010
102views more  SPEECH 2010»
14 years 4 months ago
Non-native speech perception in adverse conditions: A review
If listening in adverse conditions is hard, then listening in a foreign language is doubly so: non-native listeners have to cope with both imperfect signals and imperfect knowledg...
Maria Luisa Garcia Lecumberri, Martin Cooke, Anne ...
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 4 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen