Sciweavers

797 search results - page 149 / 160
» XML version detection
Sort
View
96
Voted
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
15 years 5 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 5 months ago
Polyphonic Audio Key Finding Using the Spiral Array CEG Algorithm
Key finding is an integral step in content-based music indexing and retrieval. In this paper, we present an O(n) real-time algorithm for determining key from polyphonic audio. We ...
Ching-Hua Chuan, Elaine Chew
SENSYS
2005
ACM
15 years 5 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...
CEAS
2005
Springer
15 years 5 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
LPAR
2005
Springer
15 years 5 months ago
The Four Sons of Penrose
Abstract. We distill Penrose’s argument against the “artificial intelligence premiss”, and analyze its logical alternatives. We then clarify the different positions one can...
Nachum Dershowitz