Sciweavers

1610 search results - page 175 / 322
» Identity Based Multisignatures
Sort
View
ICASSP
2008
IEEE
15 years 7 months ago
French prominence: A probabilistic framework
Identification of prosodic phenomena is of first importance in prosodic analysis and modeling. In this paper, we introduce a new method for automatic prosodic phenomena labellin...
Nicolas Obin, Xavier Rodet, Anne Lacheret-Dujour
ICC
2008
IEEE
160views Communications» more  ICC 2008»
15 years 7 months ago
Performance Analysis of Adaptive M-QAM for Rayleigh Fading Cooperative Systems
— The use of constant-power, rate-adaptive M-QAM transmission with an amplify-and-forward cooperative system is proposed. The upper bound expressions are derived for the outage p...
Tyler Nechiporenko, Khoa T. Phan, Chintha Tellambu...
90
Voted
SCAM
2008
IEEE
15 years 7 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
93
Voted
SIBGRAPI
2008
IEEE
15 years 7 months ago
Using Multi-agent Systems for Sampling and Rendering Implicit Surfaces
In this paper a Multi-Agent System for Sampling and Rendering Implicit Surfaces is presented (MASSRIS). Previous approaches to pen-and-ink style renderings of implicit surfaces we...
Pauline Jepp, Jörg Denzinger, Brian Wyvill, M...
111
Voted
APSCC
2007
IEEE
15 years 7 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto