Sciweavers

6431 search results - page 1096 / 1287
» Model Building by Resolution
Sort
View
133
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 9 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
IPTPS
2005
Springer
15 years 9 months ago
Peering Peer-to-Peer Providers
The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distribute...
Hari Balakrishnan, Scott Shenker, Michael Walfish
120
Voted
ISMIR
2005
Springer
135views Music» more  ISMIR 2005»
15 years 9 months ago
Automatic X Traditional Descriptor Extraction: the Case of Chord Recognition
Audio descriptor extraction is the activity of finding mathematical models which describe properties of the sound, requiring signal processing skills. The scientific literature pr...
Giordano Ribeiro de Eulalio Cabral, Françoi...
108
Voted
IWINAC
2005
Springer
15 years 9 months ago
Spatial navigation based on novelty mediated autobiographical memory
This paper presents a method for spatial navigation performed mainly on past experiences. The past experiences are remembered in their temporal context, i.e. as episodes of events....
Emilia I. Barakova, Tino Lourens
132
Voted
LOCA
2005
Springer
15 years 9 months ago
Prediction of Indoor Movements Using Bayesian Networks
Abstract. This paper investigates the efficiency of in-door next location prediction by comparing several prediction methods. The scenario concerns people in an office building vis...
Jan Petzold, Andreas Pietzowski, Faruk Bagci, Wolf...
« Prev « First page 1096 / 1287 Last » Next »