| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910484439603321 |
|
|
Titolo |
Auditory Display : 6th International Symposium, CMMR/ICAD 2009, Copenhagen, Denmark, May 18-22, 2009, Revised Papers / / edited by Sølvi Ystad, Mitsuko Aramaki, Richard Kronland-Martinet, Kristoffer Jensen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-280-38623-1 |
9786613564153 |
3-642-12439-9 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2010.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 493 p. 185 illus.) |
|
|
|
|
|
|
Collana |
|
Information Systems and Applications, incl. Internet/Web, and HCI, , 2946-1642 ; ; 5954 |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer engineering |
Computer networks |
Application software |
User interfaces (Computer systems) |
Human-computer interaction |
Database management |
Multimedia systems |
Data mining |
Computer Engineering and Networks |
Computer and Information Systems Applications |
User Interfaces and Human Computer Interaction |
Database Management |
Multimedia Information Systems |
Data Mining and Knowledge Discovery |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Auditory Display -- Tools for Designing Emotional Auditory Driver-Vehicle Interfaces -- Investigating Narrative and Performative Sound Design Strategies for Interactive Commodities -- A Review of Methods |
|
|
|
|
|
|
|
|
|
|
|
and Frameworks for Sonic Interaction Design: Exploring Existing Approaches -- Designing a Web-Based Tool That Informs the Audio Design Process -- Auditory Representations of a Graphical User Interface for a Better Human-Computer Interaction -- PhysioSonic - Evaluated Movement Sonification as Auditory Feedback in Physiotherapy -- Sonification and Information Theory -- A Sound Design for Acoustic Feedback in Elite Sports -- Surface Interactions for Interactive Sonification -- Quantum Harmonic Oscillator Sonification -- Using Sound to Identify Correlations in Market Data -- Intelligibility of HE-AAC Coded Japanese Words with Various Stereo Coding Modes in Virtual 3D Audio Space -- Navigation Performance Effects of Render Method and Head-Turn Latency in Mobile Audio Augmented Reality -- Evaluating the Utility of Auditory Perspective-Taking in Robot Speech Presentations -- Simulator Sickness in Mobile Spatial Sound Spaces -- Modeling and Retrieval -- From Signal to Substance and Back: Insights from Environmental Sound Research to Auditory Display Design -- Simulating the Soundscape through an Analysis/Resynthesis Methodology -- Effect of Sound Source Stimuli on the Perception of Reverberation in Large Volumes -- Towards Timbre Modeling of Sounds Inside Accelerating Cars -- Spatialized Synthesis of Noisy Environmental Sounds -- Imagine the Sounds: An Intuitive Control of an Impact Sound Synthesizer -- Algorithms for an Automatic Transcription of Live Music Performances into Symbolic Format -- Raising Awareness about Complete Automation of Live-Electronics: A Historical Perspective -- Polyphonic Alignment Algorithms for Symbolic Music Retrieval -- AllThatSounds: Associative Semantic Categorization of Audio Data. |
|
|
|
|
|
|
Sommario/riassunto |
|
Computer Music Modeling and Retrieval 2009 was the sixth event of this - ternational conference series that was initiated in 2003. Since the start, this conference has been co-organized by the University of Aalborg, Esbjerg, D- mark (http://www. aaue. dk) and the Laboratoire de M´ ecanique et d'Acoustique inMarseille,France(http://www. lma. cnrs-mrs. fr)andhastakenplaceinFrance, ItalyandDenmark. The'vepreviouseditionsofCMMRo'eredavariedoverview of recent years' music information retrieval and sound modeling activities in addition to alternative ?elds related to human interaction, perception and c- nition, as well as philosophical aspects linked to the ?eld. We believe that the strength and the originality of this international conference both lie in its mul- disciplinary concept and its ability to permanently evolve and open for new trends and directions within the related ?elds of interest. This year's CMMR took place in Copenhagen, Denmark, May 18-22, 2009 and was associated with theInternationalConferenceonAuditoryDisplay(http://www. icad. org),hereby introducing new topics related to sound design, soni'cation and augmented - ality to the computer music modeling and retrieval community. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910482979803321 |
|
|
Titolo |
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings / / edited by Ran Canetti |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2008.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 645 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 4948 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Algorithms |
Computer science - Mathematics |
Discrete mathematics |
Data protection |
Electronic data processing - Management |
Computers and civilization |
Cryptology |
Discrete Mathematics in Computer Science |
Data and Information Security |
IT Operations |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Technical Session 1 -- Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency -- On Seed-Incompressible Functions -- Technical Session 2 -- Asymptotically Efficient Lattice-Based Digital Signatures -- Basing Weak Public-Key Cryptography on Strong One-Way Functions -- Technical Session 3 -- Which Languages Have 4-Round Zero-Knowledge Proofs? -- How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge -- General Properties of Quantum Zero-Knowledge Proofs |
|
|
|
|
|
|
|
|
|
|
|
-- Technical Session 4 -- The Layered Games Framework for Specifications and Analysis of Security Protocols -- Universally Composable Multi-party Computation with an Unreliable Common Reference String -- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries -- Fast Private Norm Estimation and Heavy Hitters -- Technical Session 5 -- Matroids Can Be Far from Ideal Secret Sharing -- Perfectly-Secure MPC with Linear Communication Complexity -- MPC vs. SFE: Perfect Security in a Unified Corruption Model -- Invited Talk -- Bridging Game Theory and Cryptography: Recent Results and Future Directions -- Technical Session 6 -- Verifiably Secure Devices -- Lower Bounds on Implementing Robust and Resilient Mediators -- Cryptography and Game Theory: Designing Protocols for Exchanging Information -- Technical Session 7 -- Equivocal Blind Signatures and Adaptive UC-Security -- P-signatures and Noninteractive Anonymous Credentials -- Technical Session 8 -- Multi-property Preserving Combiners for Hash Functions -- OT-Combiners via Secure Computation -- Semi-honest to Malicious Oblivious Transfer—The Black-Box Way -- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One -- Technical Session 9.-A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval -- Randomness Extraction Via ?-Biased Masking in the Presence of a Quantum Attacker -- Technical Session 10 -- An Equivalence Between Zero Knowledge and Commitments -- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model -- Technical Session 11 -- The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization -- On Constant-Round Concurrent Zero-Knowledge -- Technical Session 12 -- Concurrent Non-malleable Commitments from Any One-Way Function -- Faster and Shorter Password-Authenticated Key Exchange -- Technical Session 13 -- Saving Private Randomness in One-Way Functions and Pseudorandom Generators -- Degradation and Amplification of Computational Hardness. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The 33 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. |
|
|
|
|
|
|
|
| |