Sciweavers

1466 search results - page 101 / 294
» Completeness of the Authentication Tests
Sort
View
INTERSPEECH
2010
13 years 3 months ago
Frequency-domain delexicalization using surrogate vowels
We propose a delexicalization algorithm that renders the lexical content of an utterance unintelligible, while preserving important acoustic prosodic cues, as well as naturalness ...
Alexander Kain, Jan P. H. van Santen
ICDT
2001
ACM
110views Database» more  ICDT 2001»
14 years 19 days ago
On Answering Queries in the Presence of Limited Access Patterns
In information-integration systems, source relations often have limitations on access patterns to their data; i.e., when one must provide values for certain attributes of a relatio...
Chen Li, Edward Y. Chang
JCP
2008
126views more  JCP 2008»
13 years 8 months ago
Content-Based Computer Simulation of a Networking Course: An Assessment
This paper presents a successful lab simulation experience to teach signal modulation and demodulation concepts in communication and computer networks to computer science and compu...
Giti Javidi, Ehsan Sheybani
EGC
2005
Springer
14 years 1 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
SOUPS
2010
ACM
14 years 1 days ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan