Sciweavers

1410 search results - page 254 / 282
» An operational approach to the design of workflow systems
Sort
View
CSFW
2009
IEEE
15 years 5 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
CNSR
2004
IEEE
15 years 5 months ago
A Topic Sharing Infrastructure for Weblog Networks
Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they...
Sébastien Paquet, Phillip Pearson
FPL
2008
Springer
131views Hardware» more  FPL 2008»
15 years 3 months ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...
LREC
2010
159views Education» more  LREC 2010»
15 years 2 months ago
Towards Optimal TTS Corpora
Unit selection text-to-speech systems currently produce very natural synthesized phrases by concatenating speech segments from a large database. Recently, increasing demand for de...
Didier Cadic, Cédric Boidin, Christophe d'A...
ICAD
2004
15 years 2 months ago
Data Set Selection for a Constrained Simple Sonification
Previous work on the production and test of various sonifications has shown that adding a sonification to an interface can assist the execution of a variety of operator tasks [1,2...
Shawn C. Garner