Sciweavers

5829 search results - page 976 / 1166
» The Practice of Cluster Analysis
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 10 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
152
Voted
NOLISP
2005
Springer
15 years 10 months ago
MLP Internal Representation as Discriminative Features for Improved Speaker Recognition
Feature projection by non-linear discriminant analysis (NLDA) can substantially increase classification performance. In automatic speech recognition (ASR) the projection provided b...
Dalei Wu, Andrew C. Morris, Jacques C. Koreman
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 10 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
133
Voted
SEKE
2005
Springer
15 years 10 months ago
An Empirical Study on Limits of Clone Unification Using Generics
Generics (templates) attempt to unify similar program structures to avoid redundancy. How well do generics serve this purpose in practice? We try to answer this question through e...
Hamid Abdul Basit, Damith C. Rajapakse, Stan Jarza...
142
Voted
VLDB
2005
ACM
165views Database» more  VLDB 2005»
15 years 10 months ago
Semantic Adaptation of Schema Mappings when Schemas Evolve
Schemas evolve over time to accommodate the changes in the information they represent. Such evolution causes invalidation of various artifacts depending on the schemas, such as sc...
Cong Yu, Lucian Popa