Sciweavers

1829 search results - page 354 / 366
» aims 2008
Sort
View
BIOID
2008
178views Biometrics» more  BIOID 2008»
14 years 11 months ago
Biometric System Based on Voice Recognition Using Multiclassifiers
In this paper we present a new speaker recognition system based on the fusion of two identification classifiers followed by a verification step. The user pronounces two passwords: ...
Mohamed Chenafa, Dan Istrate, Valeriu Vrabie, Mich...
80
Voted
BIRD
2008
Springer
162views Bioinformatics» more  BIRD 2008»
14 years 11 months ago
Suffix Tree Characterization of Maximal Motifs in Biological Sequences
Finding motifs in biological sequences is one of the most intriguing problems for string algorithms designers due to, on the one hand, the numerous applications of this problem in...
Maria Federico, Nadia Pisanti
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
14 years 11 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
CCS
2008
ACM
14 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
CCS
2008
ACM
14 years 11 months ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang