Sciweavers

578 search results - page 43 / 116
» Making PRIME usable
Sort
View
JCS
2010
104views more  JCS 2010»
13 years 6 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
WWW
2007
ACM
14 years 8 months ago
The use of XML to express a historical knowledge base
Since conventional historical records have been written assuming human readers, they are not well-suited for computers to collect and process automatically. If computers could und...
Katsuko T. Nakahira, Masashi Matsui, Yoshiki Mikam...
CHI
2005
ACM
14 years 8 months ago
Visualization of mappings between schemas
In this paper we describe a novel approach to the visualization of the mapping between two schemas. Current approaches to visually defining such a mapping fail when the schemas or...
George G. Robertson, Mary Czerwinski, John E. Chur...
ACSAC
2009
IEEE
14 years 2 months ago
The Design of a Trustworthy Voting System
– After the voting debacle in the Florida Presidential election of 2000 with its now-fabled hanging chads and pregnant chads, many voting jurisdictions turned to electronic votin...
Nathanael Paul, Andrew S. Tanenbaum
ICASSP
2008
IEEE
14 years 2 months ago
LSF mapping for voice conversion with very small training sets
To make voice conversion usable in practical applications, the number of training sentences should be minimized. With traditional Gaussian mixture model (GMM) based techniques sma...
Elina Helander, Jani Nurminen, Moncef Gabbouj