Sciweavers

3888 search results - page 718 / 778
» Change-Driven Model Transformations
Sort
View
DAWAK
2005
Springer
15 years 10 months ago
Optimizing a Sequence of Frequent Pattern Queries
Discovery of frequent patterns is a very important data mining problem with numerous applications. Frequent pattern mining is often regarded as advanced querying where a user speci...
Mikolaj Morzy, Marek Wojciechowski, Maciej Zakrzew...
ICCSA
2005
Springer
15 years 10 months ago
Sinogram Denoising of Cryo-Electron Microscopy Images
Cryo-electron microscopy has recently been recognized as a useful alternative to obtain three-dimensional density maps of macromolecular complexes, especially when crystallography ...
Taneli Mielikäinen, Janne Ravantti
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 10 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
ISMIR
2005
Springer
143views Music» more  ISMIR 2005»
15 years 10 months ago
A Robust Mid-Level Representation for Harmonic Content in Music Signals
When considering the problem of audio-to-audio matching, determining musical similarity using low-level features such as Fourier transforms and MFCCs is an extremely difficult ta...
Juan Pablo Bello, Jeremy Pickens
ISPEC
2005
Springer
15 years 10 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo