Sciweavers

4679 search results - page 824 / 936
» Modeling When Connections Are the Problem
Sort
View
NOLISP
2005
Springer
15 years 3 months ago
Weighting Scores to Improve Speaker-Dependent Threshold Estimation in Text-Dependent Speaker Verification
The difficulty of obtaining data from impostors and the scarcity of data are two factors that have a large influence in the estimation of speakerdependent thresholds in text-depend...
Javier R. Saeta, Javier Hernando
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 3 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
15 years 3 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
COCOON
2004
Springer
15 years 3 months ago
Transshipment Through Crossdocks with Inventory and Time Windows
Abstract. The supply chain between manufacturers and retailers always includes transshipments through a network of locations. A major challenge in making demand meet supply has bee...
Andrew Lim, Zhaowei Miao, Brian Rodrigues, Zhou Xu
GECCO
2004
Springer
113views Optimization» more  GECCO 2004»
15 years 3 months ago
Implications of Epigenetic Learning Via Modification of Histones on Performance of Genetic Programming
Extending the notion of inheritable genotype in genetic programming (GP) from the common model of DNA into chromatin (DNA and histones), we propose an approach of embedding in GP a...
Ivan Tanev, Kikuo Yuta