Sciweavers

68
Voted
SIGMAP
2007
60views Business» more  SIGMAP 2007»
15 years 2 months ago
Phonetic-based Mappings in Voice-Driven Sound Synthesis
Jordi Janer, Esteban Maestre
63
Voted
SIGMAP
2007
62views Business» more  SIGMAP 2007»
15 years 2 months ago
Rate Control for Multi-Sequence H.264/AVC Compression
Andrzej Pietrasiewicz, Grzegorz Pastuszak
84
Voted
SECRYPT
2007
77views Business» more  SECRYPT 2007»
15 years 2 months ago
Mobile Agent Security with Efficient Oblivious Transfer
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
93
Voted
SECRYPT
2007
60views Business» more  SECRYPT 2007»
15 years 2 months ago
Reliable Process for Security Policy Deployment
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
70
Voted
SECRYPT
2007
77views Business» more  SECRYPT 2007»
15 years 2 months ago
Remote Algorithmic Complexity Attacks against Randomized Hash Tables
Noa Bar-Yosef, Avishai Wool
SECRYPT
2007
92views Business» more  SECRYPT 2007»
15 years 2 months ago
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
80
Voted
SECRYPT
2007
70views Business» more  SECRYPT 2007»
15 years 2 months ago
On the Effect of Score Equalization in SVM Multimodal Biometric Systems
Pascual Ejarque, Javier Hernando
78
Voted
SECRYPT
2007
54views Business» more  SECRYPT 2007»
15 years 2 months ago
A High-Level Aspect-Oriented based Language for Software Security Hardening
Azzam Mourad, Marc-André Laverdière,...
83
Voted
SECRYPT
2007
77views Business» more  SECRYPT 2007»
15 years 2 months ago
A Secure Jailing System for Confining Untrusted Applications
Guido van 't Noordende, Ádám Balogh,...