Sciweavers

185 search results - page 35 / 37
» ieicet 2008
Sort
View
IEICET
2008
147views more  IEICET 2008»
13 years 5 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...
IEICET
2008
117views more  IEICET 2008»
13 years 5 months ago
Direct-Sequence/Spread-Spectrum Communication System with Sampling Rate Selection Diversity
In this paper, sampling rate selection diversity (SRSD) scheme for Direct-Sequence / Spread-Spectrum (DS/SS) is proposed. In DS/SS communication systems, oversampling may be employ...
Yohei Suzuki, Anas Muhamad Bostamam, Mamiko Inamor...
IEICET
2008
110views more  IEICET 2008»
13 years 5 months ago
Language Modeling Using PLSA-Based Topic HMM
In this paper, we propose a PLSA-based language model for sports live speech. This model is implemented in unigram rescaling technique that combines a topic model and an n-gram. I...
Atsushi Sako, Tetsuya Takiguchi, Yasuo Ariki
IEICET
2008
113views more  IEICET 2008»
13 years 5 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
IEICET
2008
89views more  IEICET 2008»
13 years 5 months ago
Near-Optimal Block Alignments
Abstract-In this paper, we improve the idea of the near-optimal alignments. Though the near optimal alignments increase the possibility to find the correct alignment, too many of t...
Kuo-Tsung Tseng, Chang-Biau Yang, Kuo-Si Huang, Yu...