Sciweavers

1610 search results - page 163 / 322
» Identity Based Multisignatures
Sort
View
ICASSP
2009
IEEE
15 years 7 months ago
Graphical Models: Statistical inference vs. determination
Using discrete Hidden-Markov-Models (HMMs) for recognition requires the quantization of the continuous feature vectors. In handwritten whiteboard note recognition it turns out tha...
Joachim Schenk, Benedikt Hörnler, Artur Braun...
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
15 years 6 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab
ECML
2006
Springer
15 years 6 months ago
Batch Classification with Applications in Computer Aided Diagnosis
Abstract. Most classification methods assume that the samples are drawn independently and identically from an unknown data generating distribution, yet this assumption is violated ...
Volkan Vural, Glenn Fung, Balaji Krishnapuram, Jen...
ICONIP
2007
15 years 4 months ago
Discovery of Linear Non-Gaussian Acyclic Models in the Presence of Latent Classes
Abstract. An effective way to examine causality is to conduct an experiment with random assignment. However, in many cases it is impossible or too expensive to perform controlled ...
Shohei Shimizu, Aapo Hyvärinen
DMIN
2006
151views Data Mining» more  DMIN 2006»
15 years 4 months ago
Rough Set Theory: Approach for Similarity Measure in Cluster Analysis
- Clustering of data is an important data mining application. One of the problems with traditional partitioning clustering methods is that they partition the data into hard bound n...
Shuchita Upadhyaya, Alka Arora, Rajni Jain