Sciweavers

6762 search results - page 1006 / 1353
» Multiple drafts model
Sort
View
ACISP
2009
Springer
15 years 7 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
ISMM
2009
Springer
15 years 7 months ago
Discrete Driver Assistance
Applying computer technology, such as computer vision in driver assistance, implies that processes and data are modeled as being discretized rather than being continuous. The area ...
Reinhard Klette, Ruyi Jiang, Sandino Morales, Tobi...
131
Voted
MODELS
2009
Springer
15 years 7 months ago
Product derivation for solution-driven product line engineering
Solution-driven product line engineering is a project business where products are created for each customer individually. Although reuse of results from former projects is widely ...
Christoph Elsner, Daniel Lohmann, Wolfgang Schr&ou...
116
Voted
BROADNETS
2007
IEEE
15 years 7 months ago
Resource dimensioning in WDM networks under state-based routing schemes
— Network dimensioning for wavelength-routed WDM networks has been extensively studied to maximize connection acceptance rate while minimizing the total cost. However, Internet s...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta
94
Voted
CLEAR
2007
Springer
166views Biometrics» more  CLEAR 2007»
15 years 7 months ago
The IBM Rich Transcription 2007 Speech-to-Text Systems for Lecture Meetings
The paper describes the IBM systems submitted to the NIST Rich Transcription 2007 (RT07) evaluation campaign for the speechto-text (STT) and speaker-attributed speech-to-text (SAST...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
« Prev « First page 1006 / 1353 Last » Next »