Sciweavers

8770 search results - page 1427 / 1754
» Named Service Networking
Sort
View
IWSEC
2009
Springer
15 years 10 months ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
CEC
2008
IEEE
15 years 10 months ago
Conventionalization of linguistic categories under simple communicative constraints
—The language game approach is widely adopted to study conventionalization of linguistic knowledge. Most of contemporary models concentrate on the dynamics of language games in r...
Tao Gong, Andrea Puglisi, Vittorio Loreto, William...
DSD
2008
IEEE
94views Hardware» more  DSD 2008»
15 years 10 months ago
Mapping a Fault-Tolerant Distributed Algorithm to Systems on Chip
Systems on chip (SoC) have much in common with traditional (networked) distributed systems in that they consist of largely independent components with dedicated communication inte...
Gottfried Fuchs, Matthias Függer, Ulrich Schm...
ICASSP
2008
IEEE
15 years 10 months ago
Polyphase speech recognition
We propose a model for speech recognition that consists of multiple semi-synchronized recognizers operating on a polyphase decomposition of standard speech features. Specifically...
Hui Lin, Jeff Bilmes
ICC
2008
IEEE
117views Communications» more  ICC 2008»
15 years 10 months ago
Semi-Blind Power Allocation for Digital Subscriber Lines
— Digital subscriber lines (DSL) are today one of the most important means for delivering high-speed data transmission. An emerging technique for dealing with one of the technolo...
Rodrigo Moraes, Boris Dortschy, Aldebaro Klautau, ...
« Prev « First page 1427 / 1754 Last » Next »