Sciweavers

633 search results - page 24 / 127
» A Few Constructions on Constructors
Sort
View
OPODIS
2010
14 years 11 months ago
SkewCCC+: A Heterogeneous Distributed Hash Table
Distributed Hash Tables (DHTs) enable fully distributed Peer-to-Peer network construction and maintenance with name-driven routing. There exist very few DHT approaches that conside...
Marcin Bienkowski, André Brinkmann, Marek K...
123
Voted
ICASSP
2011
IEEE
14 years 5 months ago
A basis method for robust estimation of constrained MLLR
Constrained Maximum Likelihood Linear Regression (CMLLR) is a widely used speaker adaptation technique in which an affine transform of the features is estimated for each speaker....
Daniel Povey, Kaisheng Yao
197
Voted
3DIM
2011
IEEE
14 years 1 months ago
Stereo Matching with Reliable Disparity Propagation
Abstract—In this paper, we propose a novel propagationbased stereo matching algorithm. Starting from an initial disparity map, our algorithm selects highly reliable pixels and pr...
Xun Sun, Xing Mei, Shaohui Jiao, Mingcai Zhou, Hai...
111
Voted
CIKM
2011
Springer
14 years 1 months ago
Supervised language modeling for temporal resolution of texts
We investigate temporal resolution of documents, such as determining the date of publication of a story based on its text. We describe and evaluate a model that build histograms e...
Abhimanu Kumar, Matthew Lease, Jason Baldridge
123
Voted
IACR
2011
133views more  IACR 2011»
14 years 1 months ago
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
The McEliece cryptosystem is one of the few systems to be considered secure against attacks by Quantum computers. The original scheme is built upon Goppa codes and produces very l...
Edoardo Persichetti