Sciweavers

3928 search results - page 753 / 786
» Optimal suffix selection
Sort
View
AUSAI
2004
Springer
14 years 29 days ago
Reliable Unseen Model Prediction for Vocabulary-Independent Speech Recognition
Speech recognition technique is expected to make a great impact on many user interface areas such as toys, mobile phones, PDAs, and home appliances. Those applications basically re...
Sungtak Kim, Hoirin Kim
CAISE
2004
Springer
14 years 29 days ago
MT-Flow - An Environment for Workflow-Supported Model Transformations in MDA
Abstract. Specification of systems in a software product line (product-line members) is often supported by domain-specific languages (DSLs) that provide pownguage abstractions for ...
Jernej Kovse, Theo Härder
CAISE
2004
Springer
14 years 29 days ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
ESAS
2004
Springer
14 years 28 days ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
EUROCRYPT
2004
Springer
14 years 28 days ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer