Sciweavers

3638 search results - page 118 / 728
» Distribution chain security
Sort
View
97
Voted
ICASSP
2009
IEEE
15 years 6 months ago
The expected amplitude of overlapping partials of harmonic sounds
In analyzing polyphonic signals, the handling of overlapping partials is one important problem. The assumptions usually made for partial overlaps are the additivity of the linear ...
Chunghsin Yeh, Axel Roebel
DMIN
2007
168views Data Mining» more  DMIN 2007»
15 years 4 months ago
On Clustering Users' Behaviors in Video Sessions
We study the extraction of characteristics of user behavior in video session encoded as stochastic matrices of finite Markov chain. These behaviors are clustered using a dissimil...
Sylvain Mongy, Chabane Djeraba, Dan A. Simovici
BIOSYSTEMS
2007
111views more  BIOSYSTEMS 2007»
15 years 2 months ago
A Markovian approach to the control of genetic regulatory networks
This paper presents an approach for controlling gene networks based on a Markov chain model, where the state of a gene network is represented as a probability distribution, while ...
Peter C. Y. Chen, Jeremy W. Chen
138
Voted
CONTEXT
2003
Springer
15 years 7 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 6 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval