Sciweavers

1610 search results - page 268 / 322
» Identity Based Multisignatures
Sort
View
INTERACT
2003
13 years 11 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
ACL
1998
13 years 11 months ago
Named Entity Scoring for Speech Input
This paper describes a new scoring algorithm that supports comparison of linguistically annotated data from noisy sources. The new algorithm generalizes the Message Understanding ...
John D. Burger, David D. Palmer, Lynette Hirschman
NIPS
1997
13 years 11 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
ATMN
1996
13 years 11 months ago
Traffic characterisation and modelling of VBR coded MPEG sources
This paper intends to study the characteristics of VBR MPEG sources and performs models for their traffic behaviour. Our analysis focuses on long-time MPEG video films, approximat...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Geor...
BIOCOMP
2009
13 years 11 months ago
Improving Remote Homology Detection Using Sequence Properties and Position Specific Scoring Matrices
Current biological sequence comparison tools frequently fail to recognize matches between homologs when sequence similarity is below the twilight zone of less than 25% sequence id...
Gina Cooper, Michael L. Raymer