Sciweavers

1456 search results - page 174 / 292
» Keeping encountered information
Sort
View
140
Voted
JSW
2008
240views more  JSW 2008»
15 years 1 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
TASLP
2008
207views more  TASLP 2008»
15 years 1 months ago
Joint Morphological-Lexical Language Modeling for Processing Morphologically Rich Languages With Application to Dialectal Arabic
Language modeling for an inflected language such as Arabic poses new challenges for speech recognition and machine translation due to its rich morphology. Rich morphology results i...
Ruhi Sarikaya, Mohamed Afify, Yonggang Deng, Hakan...
TIFS
2008
154views more  TIFS 2008»
15 years 1 months ago
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network...
Juan M. Estévez-Tapiador, Julio Césa...
CCR
2000
101views more  CCR 2000»
15 years 1 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
104
Voted
ICASSP
2010
IEEE
15 years 10 days ago
Building pair-wise visual word tree for efficent image re-ranking
Bag-of-visual Words (BoW) image representation is getting popular in computer vision and multimedia communities. However, experiments show that the traditional BoW representation ...
Shiliang Zhang, Qingming Huang, Yijuan Lu, Wen Gao...