Sciweavers

1282 search results - page 47 / 257
» Signing on signing off
Sort
View
ENDM
2002
134views more  ENDM 2002»
13 years 9 months ago
Bounds on the signed domination number of a graph
Let G = (V, E) be a simple graph on vertex set V and define a function f : V {-1, 1}. The function f is a signed dominating function if for every vertex x V, the closed neighbor...
Ruth Haas, Thomas B. Wexler
ICPR
2008
IEEE
14 years 10 months ago
Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP
Current sign language recognition systems are still designed for signer-dependent operation only and thus suffer from the problem of interpersonal variability in production. Appli...
Christoph Blömer, Karl-Friedrich Kraiss, Ulri...
DCC
2007
IEEE
14 years 8 months ago
On binary signed digit representations of integers
Applications of signed digit representations of an integer include computer arithmetic, cryptography, and digital signal processing. An integer of length n bits can have several b...
Nevine Maurice Ebeid, M. Anwar Hasan
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
14 years 3 months ago
Activity detection in conversational sign language video for mobile telecommunication
The goal of the MobileASL project is to increase accessibility by making the mobile telecommunications network available to the signing Deaf community. Video cell phones enable De...
Neva Cherniavsky, Richard E. Ladner, Eve A. Riskin
ACISP
2007
Springer
14 years 3 months ago
Hash-and-Sign with Weak Hashing Made Secure
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Sylvain Pasini, Serge Vaudenay