Sciweavers

2629 search results - page 274 / 526
» complex 2009
Sort
View
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 11 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
ICICS
2009
Springer
15 years 11 months ago
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
TAMC
2009
Springer
15 years 11 months ago
Approximation and Hardness Results for Label Cut and Related Problems
We investigate a natural combinatorial optimization problem called the Label Cut problem. Given an input graph G with a source s and a sink t, the edges of G are classified into ...
Peng Zhang, Jin-yi Cai, Linqing Tang, Wenbo Zhao
ICUIMC
2009
ACM
15 years 11 months ago
PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data
Although documents have hundreds of thousands of unique words, only a small number of words are significantly useful for intelligent services. For this reason, feature extraction ...
Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee
ICASSP
2009
IEEE
15 years 9 months ago
From rule-based to statistical grammars: Continuous improvement of large-scale spoken dialog systems
Statistical Spoken LanguageUnderstandinggrammars (SSLUs) are often used only at the top recognition contexts of modern large-scale spoken dialog systems. We propose to use SSLUs a...
David Suendermann, Keelan Evanini, Jackson Liscomb...