Sciweavers

7066 search results - page 212 / 1414
» Contact Relations with Applications
Sort
View
ACISP
2007
Springer
15 years 8 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...
126
Voted
CDC
2008
IEEE
125views Control Systems» more  CDC 2008»
15 years 6 months ago
Application of real rational modules in system identification
This paper introduces a real rational module framework in the context of Prediction Error Identification using Box-Jenkins model structures. This module framework, which can easily...
Tzvetan Ivanov, Pierre-Antoine Absil, Brian D. O. ...
FLAIRS
2004
15 years 6 months ago
ABSURDIST II: A Graph Matching Algorithm and its Application to Conceptual System Translation
ABSURDIST II, an extension to ABSURDIST, is an algorithm using attributed graph matching to find translations between conceptual systems. It uses information about the internal st...
Ying Feng, Robert L. Goldstone, Vladimir Menkov
ICAD
2004
15 years 6 months ago
Control and Measurement of Apparent Sound Source Width and its Applications to Sonification and Virtual Auditory Displays
The aim of this paper is to investigate the possibility of using the spatial extent of sound sources as a mean of carrying information in sonification designs. To do so, we studie...
Guillaume Potard, Ian S. Burnett
IJIT
2004
15 years 6 months ago
A Hybrid Model for Part-of-Speech Tagging and its Application to Bengali
This paper describes our work on Bengali Part of Speech (POS) tagging using a corpus-based approach. There are several approaches for part of speech tagging. This paper deals with ...
Sandipan Dandapat, Sudeshna Sarkar, Anupam Basu