Sciweavers

247 search results - page 12 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
JSW
2007
112views more  JSW 2007»
14 years 11 months ago
The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology
— This paper describes the importance of new skilled architects in the discipline of Software and Enterprise Architecture. Architects are often idealized as super heroes with a l...
Anabel Fraga, Juan Lloréns
BMCBI
2006
207views more  BMCBI 2006»
14 years 11 months ago
A new measure for functional similarity of gene products based on Gene Ontology
Background: Gene Ontology (GO) is a standard vocabulary of functional terms and allows for coherent annotation of gene products. These annotations provide a basis for new methods ...
Andreas Schlicker, Francisco S. Domingues, Jö...
ICASSP
2009
IEEE
14 years 9 months ago
Phoneme cluster based state mapping for text-independent voice conversion
This paper takes phonetic information into account for data alignment in text-independent voice conversion. Hidden Markov Models are used for representing the phonetic structure o...
Meng Zhang, Jiaohua Tao, Jani Nurminen, Jilei Tian...
IJNSEC
2007
138views more  IJNSEC 2007»
14 years 11 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
112
Voted
CORR
2008
Springer
187views Education» more  CORR 2008»
14 years 12 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...