: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
A significant challenge in Text-to-Speech (TtS) synthesis is the formulation of the prosodic structures (phrase breaks, pitch accents, phrase accents and boundary tones) of uttera...
We study the fundamental limitations of relational algebra (RA) and SQL in supporting sequence and stream queries, and present effective query language and data model enrichments ...
This paper presents a novel algorithm for identification and functional characterization of “key” genome features responsible for a particular biochemical process of interest....
Gong-Xin Yu, George Ostrouchov, Al Geist, Nagiza F...
It has been over two decades since Group Support Systems (GSS) emerged on the Information Technology (IT) scene. GSS have now been commercialized and are present in an increasing ...
Gert-Jan de Vreede, Douglas R. Vogel, Gwendolyn L....