Sciweavers

2059 search results - page 338 / 412
» A Directed Threshold - Signature Scheme
Sort
View
COST
2008
Springer
186views Multimedia» more  COST 2008»
15 years 6 months ago
Automatic Motherese Detection for Face-to-Face Interaction Analysis
This paper deals with emotional speech detection in home movies. In this study, we focus on infant-directed speech also called "motherese" which is characterized by highe...
Ammar Mahdhaoui, Mohamed Chetouani, Cong Zong, Raq...
CRYPTO
2008
Springer
120views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
Jean-Sébastien Coron, Jacques Patarin, Yann...
ESA
2008
Springer
115views Algorithms» more  ESA 2008»
15 years 6 months ago
A New Approach to Exact Crossing Minimization
The crossing number problem is to find the smallest number of edge crossings necessary when drawing a graph into the plane. Eventhough the problem is NP-hard, we are interested in ...
Markus Chimani, Petra Mutzel, Immanuel M. Bomze
ESWS
2008
Springer
15 years 6 months ago
Entity Identifiers for Lineage Preservation
Abstract. The generation of entity identifiers is a key issue in the context of semantic web technologies. Entity identifiers are needed when we perform any kind of operation (e.g....
Julien Gaugaz, Gianluca Demartini
BIOCOMP
2007
15 years 5 months ago
Towards Phylogenomic Reconstruction
Reconstructing phylogenies is one of the primary objectives in evolution studies. Efficient software to reconstruct phylogenies based on isolated genes has existed for decades, ye...
Le Vinh, Andres Varon, Daniel Janies, Ward Wheeler