Sciweavers

38 search results - page 2 / 8
» An Improved Robust Fuzzy Extractor
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
ISCAS
2003
IEEE
124views Hardware» more  ISCAS 2003»
13 years 10 months ago
Improving the filter bank of a classic speech feature extraction algorithm
The most popular speech feature extractor used in automatic speech recognition (ASR) systems today is the mel frequency cepstral coefficient (mfcc) algorithm. Introduced in 1980,...
Mark D. Skowronski, John G. Harris
IJCNN
2006
IEEE
13 years 11 months ago
An Interval Type-II Robust Fuzzy Logic Controller for a Static Compensator in a Multimachine Power System
—This paper presents a novel fuzzy logic based controller for a Static Compensator (STATCOM) connected to a power system. Type-II fuzzy systems are selected that enable the contr...
Salman Mohagheghi, Ganesh K. Venayagamoorthy, Rona...
ECSQARU
2005
Springer
13 years 10 months ago
Generating Fuzzy Models from Deep Knowledge: Robustness and Interpretability Issues
The most problematic and challenging issues in fuzzy modeling of nonlinear system dynamics deal with robustness and interpretability. Traditional data-driven approaches, especially...
Raffaella Guglielmann, Liliana Ironi
BIOSIG
2009
75views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
Multi-Sample Fusion with Template Protection
: The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, f...
Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Ve...