Sciweavers

3928 search results - page 753 / 786
» Optimal suffix selection
Sort
View
AUSAI
2004
Springer
15 years 3 months ago
Reliable Unseen Model Prediction for Vocabulary-Independent Speech Recognition
Speech recognition technique is expected to make a great impact on many user interface areas such as toys, mobile phones, PDAs, and home appliances. Those applications basically re...
Sungtak Kim, Hoirin Kim
CAISE
2004
Springer
15 years 3 months ago
MT-Flow - An Environment for Workflow-Supported Model Transformations in MDA
Abstract. Specification of systems in a software product line (product-line members) is often supported by domain-specific languages (DSLs) that provide pownguage abstractions for ...
Jernej Kovse, Theo Härder
CAISE
2004
Springer
15 years 3 months ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
ESAS
2004
Springer
15 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
EUROCRYPT
2004
Springer
15 years 3 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer