Sciweavers

4187 search results - page 723 / 838
» A Taxonomy of Model Transformation
Sort
View
88
Voted
ICCSA
2005
Springer
15 years 7 months ago
Sinogram Denoising of Cryo-Electron Microscopy Images
Cryo-electron microscopy has recently been recognized as a useful alternative to obtain three-dimensional density maps of macromolecular complexes, especially when crystallography ...
Taneli Mielikäinen, Janne Ravantti
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 7 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
116
Voted
ISMIR
2005
Springer
143views Music» more  ISMIR 2005»
15 years 7 months ago
A Robust Mid-Level Representation for Harmonic Content in Music Signals
When considering the problem of audio-to-audio matching, determining musical similarity using low-level features such as Fourier transforms and MFCCs is an extremely difficult ta...
Juan Pablo Bello, Jeremy Pickens
98
Voted
ISPEC
2005
Springer
15 years 7 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
IVA
2005
Springer
15 years 7 months ago
An Objective Character Believability Evaluation Procedure for Multi-agent Story Generation Systems
Abstract. The ability to generate narrative is of importance to computer systems that wish to use story effectively for entertainment, training, or education. One of the focuses of...
Mark O. Riedl, R. Michael Young