Sciweavers

1513 search results - page 247 / 303
» Cryptographic Pattern Matching
Sort
View
ICIAP
2005
ACM
14 years 1 months ago
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Giorgio Giacinto, Fabio Roli, Roberto Tronci
IJCNLP
2005
Springer
14 years 1 months ago
A Chunking Strategy Towards Unknown Word Detection in Chinese Word Segmentation
This paper proposes a chunking strategy to detect unknown words in Chinese word segmentation. First, a raw sentence is pre-segmented into a sequence of word atoms 1 using a maximum...
Guodong Zhou
ISPEC
2005
Springer
14 years 1 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
NIME
2005
Springer
104views Music» more  NIME 2005»
14 years 1 months ago
User Interface Comparison for Virtual Drums
An experimental study comparing different user interfaces for a virtual drum is reported. Virtual here means that the drum is not a physical object. 16 subjects played the drum on...
Teemu Mäki-Patola
SAC
2004
ACM
14 years 1 months ago
Knowledge-based conversational agents and virtual storytelling
Abstract. We describe an architecture for building speech-enabled conversational agents, deployed as self-contained Web services, with ability to provide inference processing on ve...
Paul Tarau, Elizabeth Figa