Sciweavers

3905 search results - page 772 / 781
» Teaching Design Patterns
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
MM
2010
ACM
402views Multimedia» more  MM 2010»
13 years 6 months ago
Discriminative codeword selection for image representation
Bag of features (BoF) representation has attracted an increasing amount of attention in large scale image processing systems. BoF representation treats images as loose collections...
Lijun Zhang 0005, Chun Chen, Jiajun Bu, Zhengguang...
SPEECH
2010
142views more  SPEECH 2010»
13 years 5 months ago
Analysis of statistical parametric and unit selection speech synthesis systems applied to emotional speech
We have applied two state-of-the-art speech synthesis techniques (unit selection and HMM-based synthesis) to the synthesis of emotional speech. A series of carefully designed perc...
Roberto Barra-Chicote, Junichi Yamagishi, Simon Ki...
TPDS
2010
104views more  TPDS 2010»
13 years 5 months ago
From an Asynchronous Intermittent Rotating Star to an Eventual Leader
—Considering an asynchronous system made up of n processes and where up to t of them can crash, finding the weakest assumption that such a system has to satisfy for a common lea...
Antonio Fernández Anta, Michel Raynal
WDAG
2010
Springer
218views Algorithms» more  WDAG 2010»
13 years 5 months ago
Anonymous Asynchronous Systems: The Case of Failure Detectors
Abstract: Due the multiplicity of loci of control, a main issue distributed systems have to cope with lies in the uncertainty on the system state created by the adversaries that ar...
François Bonnet, Michel Raynal