Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CIS
2005
Springer
10 years 8 months ago
MFCC and SVM Based Recognition of Chinese Vowels
Abstract. The recognition of vowels in Chinese speech is very important for Chinese speech recognition and understanding. However, it is rather difficult and there has been no effi...
Fuhai Li, Jinwen Ma, Dezhi Huang
CIS
2005
Springer
10 years 8 months ago
Two Adaptive Matching Learning Algorithms for Independent Component Analysis
Independent component analysis (ICA) has been applied in many fields of signal processing and many ICA learning algorithms have been proposed from different perspectives. However...
Jinwen Ma, Fei Ge, Dengpan Gao
CIS
2005
Springer
10 years 8 months ago
A Naive Statistics Method for Electronic Program Guide Recommendation System
Abstract. In this paper, we propose a naive statistics method for constructing a personalized recommendation system for the Electronic Program Guide (EPG). The idea is based on a p...
Jin An Xu, Kenji Araki
CIS
2005
Springer
10 years 8 months ago
Medical Image Alignment by Normal Vector Information
In this paper, a new approach on image registration is presented. We introduce a novel conception- normal vector information (NVI) - to evaluate the similarity between two images. ...
Xiahai Zhuang, Lixu Gu, Jianfeng Xu
CIS
2005
Springer
10 years 8 months ago
On Anonymity of Group Signatures
A secure group signature is required to be anonymous, that is, given two group signatures generated by two different members on the same message or two group signatures generated ...
Sujing Zhou, Dongdai Lin
CIS
2005
Springer
10 years 8 months ago
An Improved EMASK Algorithm for Privacy-Preserving Frequent Pattern Mining
Abstract. As a novel research direction, privacy-preserving data mining (PPDM) has received a great deal of attentions from more and more researchers, and a large number of PPDM al...
Congfu Xu, Jinlong Wang, Hongwei Dan, Yunhe Pan
CIS
2005
Springer
10 years 8 months ago
A Novel Multi-stage 3D Medical Image Segmentation: Methodology and Validation
Abstract. In this paper, we present a novel multi-stage algorithm for 3D medical image segmentation that is inspired by an improved Fast Marching method and a morphological reconst...
Jianfeng Xu, Lixu Gu, Xiahai Zhuang, Terry M. Pete...
CIS
2005
Springer
10 years 8 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell
CIS
2005
Springer
10 years 8 months ago
Concept Chain Based Text Clustering
Different from familiar clustering objects, text documents have sparse data spaces. A common way of representing a document is as a bag of its component words, but the semantic re...
Shaoxu Song, Jian Zhang, Chunping Li
CIS
2005
Springer
10 years 8 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang
books