Sciweavers

144 search results - page 24 / 29
» A Model to Incorporate Privacy in Organizational Memory Syst...
Sort
View
ACISP
2006
Springer
13 years 10 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
ICASSP
2009
IEEE
14 years 1 months ago
Robust discriminative keyword spotting for emotionally colored spontaneous speech using bidirectional LSTM networks
In this paper we propose a new technique for robust keyword spotting that uses bidirectional Long Short-Term Memory (BLSTM) recurrent neural nets to incorporate contextual informa...
Martin Wöllmer, Florian Eyben, Joseph Keshet,...
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
14 years 8 days ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
XMLSEC
2003
ACM
13 years 12 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
GD
2008
Springer
13 years 7 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...