Sciweavers

1610 search results - page 42 / 322
» Identity Based Multisignatures
Sort
View
ICASSP
2009
IEEE
14 years 4 months ago
Quality control of automatic labelling using HMM-based synthesis
This paper presents a measure to verify the quality of automatically aligned phone labels. The measure is based on a similarity cost between automatically generated phonetic segme...
Sathish Pammi, Marcela Charfuelan, Marc Schrö...
ITRE
2006
IEEE
14 years 3 months ago
Emotion Elicitation in a Computerized Gambling Game
We have designed a novel computer controlled environment that elicits emotions in subjects while they are uttering short identical phrases. The paradigm is based on Damasio's...
Vered Aharonson, Noam Amir
IEEEARES
2006
IEEE
14 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ACISP
2000
Springer
14 years 2 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski
IJAC
2000
70views more  IJAC 2000»
13 years 9 months ago
Finitely Based, Finite Sets of Words
For W a finite set of words, we consider the Rees quotient of a free monoid with respect to the ideal consisting of all words that are not subwords of W. This monoid is denoted by...
Marcel Jackson, Olga Sapir