Sciweavers

1219 search results - page 68 / 244
» Where to Look Next
Sort
View
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 4 months ago
An Analysis of Korean National Information Strategy of IT839
Recently, the Korean government launched the IT839 project with the objective of converting Korea into a ubiquitous information society. This study investigates the role of the Ko...
Dong Hee Shin, Won-Yong Kim
ACNS
2008
Springer
121views Cryptology» more  ACNS 2008»
14 years 4 months ago
Anonymity in Transferable E-cash
Regular cash systems provide both the anonymity of users and the transferability of coins. In this paper, we study the anonymity properties of transferable e-cash. We define two n...
Sébastien Canard, Aline Gouget
LCN
2007
IEEE
14 years 4 months ago
A Distributed Scheduling Approach for Ethernet-based Passive Optical Networks
— Ethernet-based Passive Optical Networks (EPON) are being considered as the best candidates for the next generation broadband access networks. Several algorithms for dynamic ban...
Marilet De Andrade, Lluís Gutierrez, Sebast...
ICCS
2007
Springer
14 years 3 months ago
Active Learning with Support Vector Machines for Tornado Prediction
In this paper, active learning with support vector machines (SVMs) is applied to the problem of tornado prediction. This method is used to predict which storm-scale circulations yi...
Theodore B. Trafalis, Indra Adrianto, Michael B. R...
NOLISP
2007
Springer
14 years 3 months ago
Quantitative Perceptual Separation of Two Kinds of Degradation in Speech Denoising Applications
Classical objective criteria evaluate speech quality using one quantity which embed all possible kind of degradation. For speech denoising applications, there is a great need to d...
Anis Ben Aicha, Sofia Ben Jebara