Sciweavers

1018 search results - page 67 / 204
» Building the Biodiversity Commons
Sort
View
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
EUROMICRO
2009
IEEE
15 years 6 months ago
Bridging the Component-Based and Service-Oriented Worlds
Abstract—The component-based and service-oriented development have become commonly used techniques for building high quality, evolvable, large systems in a timely and affordable ...
Karel Masek, Petr Hnetynka, Tomás Bures
ICASSP
2009
IEEE
15 years 6 months ago
Incorporating prior knowledge on the digital media creation process into audio classifiers
In the process of music content creation, a wide range of typical audio effects such as reverberation, equalization or dynamic compression are very commonly used. Despite the fact...
Maxime Lardeur, Slim Essid, Gaël Richard, Mar...
AIMS
2009
Springer
15 years 6 months ago
Towards Cost-Aware Multipath Routing
Abstract. Traditional approaches to multipath routing ignore the economic incentives necessary in aligning both networks and users towards a common goal. While theory suggests cong...
João Taveira Araújo, Miguel Rio, Geo...
MOBISEC
2009
Springer
15 years 6 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan