Sciweavers

813 search results - page 19 / 163
» Pipeline-centric provenance model
Sort
View
ASIACRYPT
2000
Springer
14 years 18 hour ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
BMCBI
2004
208views more  BMCBI 2004»
13 years 7 months ago
Using 3D Hidden Markov Models that explicitly represent spatial coordinates to model and compare protein structures
Background: Hidden Markov Models (HMMs) have proven very useful in computational biology for such applications as sequence pattern matching, gene-finding, and structure prediction...
Vadim Alexandrov, Mark Gerstein
ICASSP
2009
IEEE
14 years 2 months ago
Combining mixture weight pruning and quantization for small-footprint speech recognition
Semi-continuous acoustic models, where the output distributions for all Hidden Markov Model states share a common codebook of Gaussian density functions, are a well-known and prov...
David Huggins-Daines, Alexander I. Rudnicky
SC
2009
ACM
14 years 2 months ago
Exploring many task computing in scientific workflows
One of the main advantages of using a scientific workflow management system (SWfMS) to orchestrate data flows among scientific activities is to control and register the whole work...
Eduardo S. Ogasawara, Daniel de Oliveira, Fernando...
ICDE
2012
IEEE
239views Database» more  ICDE 2012»
11 years 10 months ago
Provenance-based Indexing Support in Micro-blog Platforms
Abstract— Recently, lots of micro-blog message sharing applications have emerged on the web. Users can publish short messages freely and get notified by the subscriptions instan...
Junjie Yao, Bin Cui, Zijun Xue, Qingyun Liu