Sciweavers

7918 search results - page 1377 / 1584
» Model Composition Directives
Sort
View
139
Voted
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
15 years 5 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
134
Voted
CIVR
2008
Springer
127views Image Analysis» more  CIVR 2008»
15 years 5 months ago
Performance evaluation of relevance feedback methods
In this paper we review the evaluation of relevance feedback methods for content-based image retrieval systems. We start out by presenting an overview of current common practice, ...
Mark J. Huiskes, Michael S. Lew
156
Voted
COORDINATION
2008
Springer
15 years 5 months ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...
103
Voted
COST
2008
Springer
186views Multimedia» more  COST 2008»
15 years 5 months ago
Automatic Motherese Detection for Face-to-Face Interaction Analysis
This paper deals with emotional speech detection in home movies. In this study, we focus on infant-directed speech also called "motherese" which is characterized by highe...
Ammar Mahdhaoui, Mohamed Chetouani, Cong Zong, Raq...
107
Voted
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
15 years 5 months ago
Inter-organizational Knowledge Transfer in the Buyer-Supplier Relationship: A Buyer's Perspective
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...
Sung-Byung Yang, Young-Gul Kim
« Prev « First page 1377 / 1584 Last » Next »