Sciweavers

19010 search results - page 3706 / 3802
» Adaptive A
Sort
View
107
Voted
JCST
2006
99views more  JCST 2006»
15 years 19 days ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...
JTAER
2008
82views more  JTAER 2008»
15 years 19 days ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
105
Voted
JUCS
2008
156views more  JUCS 2008»
15 years 19 days ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
118
Voted
JUCS
2008
177views more  JUCS 2008»
15 years 19 days ago
An Improved Multi-Agent Simulation Methodology for Modelling and Evaluating Wireless Communication Systems Resource Allocation A
: Multi-Agent Systems (MAS) constitute a well known approach in modelling dynamical real world systems. Recently, this technology has been applied to Wireless Communication Systems...
P. M. Papazoglou, Dimitris A. Karras, Rallis C. Pa...
164
Voted
JUCS
2008
161views more  JUCS 2008»
15 years 19 days ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
« Prev « First page 3706 / 3802 Last » Next »