Sciweavers

247 search results - page 12 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
JSW
2007
112views more  JSW 2007»
13 years 7 months ago
The Challenge of Training New Architects: an Ontological and Reinforcement-Learning Methodology
— This paper describes the importance of new skilled architects in the discipline of Software and Enterprise Architecture. Architects are often idealized as super heroes with a l...
Anabel Fraga, Juan Lloréns
BMCBI
2006
207views more  BMCBI 2006»
13 years 7 months ago
A new measure for functional similarity of gene products based on Gene Ontology
Background: Gene Ontology (GO) is a standard vocabulary of functional terms and allows for coherent annotation of gene products. These annotations provide a basis for new methods ...
Andreas Schlicker, Francisco S. Domingues, Jö...
ICASSP
2009
IEEE
13 years 5 months ago
Phoneme cluster based state mapping for text-independent voice conversion
This paper takes phonetic information into account for data alignment in text-independent voice conversion. Hidden Markov Models are used for representing the phonetic structure o...
Meng Zhang, Jiaohua Tao, Jani Nurminen, Jilei Tian...
IJNSEC
2007
138views more  IJNSEC 2007»
13 years 7 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 7 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...