Sciweavers

4057 search results - page 611 / 812
» Linear combination of transformations
Sort
View
ASSETS
2009
ACM
13 years 5 months ago
VocaliD: personalizing text-to-speech synthesis for individuals with severe speech impairment
Speech synthesis options on assistive communication devices are very limited and do not reflect the user’s vocal quality or personality. Previous work suggests that speakers wit...
Camil Jreige, Rupal Patel, H. Timothy Bunnell
AISS
2010
107views more  AISS 2010»
13 years 5 months ago
A Simple Wavelet Method for Automated Detection of Epileptic Neural Spikes in Electroencephalogram
In clinical diagnosis process of epilepsy, the physicians rely on tedious visual screening of long time recorded electroencephalograms (EEG) for detection and localization of impo...
Berdakh Abibullaev, Won-Seok Kang, Seung-Hyun Lee,...
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 5 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
COR
2011
13 years 3 months ago
MIP models for connected facility location: A theoretical and computational study
This article comprises the first theoretical and computational study on mixed integer programming (MIP) models for the connected facility location problem (ConFL). ConFL combines...
Stefan Gollowitzer, Ivana Ljubic