Sciweavers

756 search results - page 4 / 152
» The role data model revisited
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 1 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
FDL
2007
IEEE
13 years 11 months ago
Transaction Level Modelling: A reflection on what TLM is and how TLMs may be classified
Transaction-level modelling (TLM) is a poorlyterm, promising a level of abstraction like RTL (register transfer level), where the key feature is a `transaction'. But unlike r...
Mark Burton, James Aldis, Robert Günzel, Wolf...
LREC
2008
103views Education» more  LREC 2008»
13 years 8 months ago
LIRICS Semantic Role Annotation: Design and Evaluation of a Set of Data Categories
In this paper we report on the analyses of alternative approaches to semantic role annotation (FrameNet (FrameNet, 2005), PropBank (Palmer et al., 2005) and VerbNet (Kipper, 2006)...
Volha Petukhova, Harry Bunt
PAMI
2011
13 years 2 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
ICASSP
2009
IEEE
14 years 2 months ago
Revisiting graphemes with increasing amounts of data
Letter units, or graphemes, have been reported in the literature as a surprisingly effective substitute to the more traditional phoneme units, at least in languages that enjoy a s...
Yun-Hsuan Sung, Thad Hughes, Françoise Beau...