Sciweavers

20745 search results - page 3803 / 4149
» Computer graphics for all
Sort
View
CCS
2008
ACM
15 years 6 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
CHINZ
2008
ACM
15 years 6 months ago
Interactive visualisation techniques for dynamic speech transcription, correction and training
As performance gains in automatic speech recognition systems plateau, improvements to existing applications of speech recognition technology seem more likely to come from better u...
Saturnino Luz, Masood Masoodian, Bill Rogers
CIKM
2008
Springer
15 years 6 months ago
Modeling hidden topics on document manifold
Topic modeling has been a key problem for document analysis. One of the canonical approaches for topic modeling is Probabilistic Latent Semantic Indexing, which maximizes the join...
Deng Cai, Qiaozhu Mei, Jiawei Han, Chengxiang Zhai
ACMSE
2006
ACM
15 years 6 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
« Prev « First page 3803 / 4149 Last » Next »