Sciweavers

185 search results - page 35 / 37
» ieicet 2008
Sort
View
95
Voted
IEICET
2008
147views more  IEICET 2008»
15 years 24 days ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...
IEICET
2008
117views more  IEICET 2008»
15 years 24 days ago
Direct-Sequence/Spread-Spectrum Communication System with Sampling Rate Selection Diversity
In this paper, sampling rate selection diversity (SRSD) scheme for Direct-Sequence / Spread-Spectrum (DS/SS) is proposed. In DS/SS communication systems, oversampling may be employ...
Yohei Suzuki, Anas Muhamad Bostamam, Mamiko Inamor...
95
Voted
IEICET
2008
110views more  IEICET 2008»
15 years 24 days ago
Language Modeling Using PLSA-Based Topic HMM
In this paper, we propose a PLSA-based language model for sports live speech. This model is implemented in unigram rescaling technique that combines a topic model and an n-gram. I...
Atsushi Sako, Tetsuya Takiguchi, Yasuo Ariki
92
Voted
IEICET
2008
113views more  IEICET 2008»
15 years 24 days ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
87
Voted
IEICET
2008
89views more  IEICET 2008»
15 years 24 days ago
Near-Optimal Block Alignments
Abstract-In this paper, we improve the idea of the near-optimal alignments. Though the near optimal alignments increase the possibility to find the correct alignment, too many of t...
Kuo-Tsung Tseng, Chang-Biau Yang, Kuo-Si Huang, Yu...