Sciweavers

665 search results - page 55 / 133
» Contrast in concept-to-speech generation
Sort
View
CSFW
2007
IEEE
15 years 5 months ago
The Insecurity Problem: Tackling Unbounded Data
In this paper we focus on tackling the insecurity problem of security protocols in the presence of an unbounded number of data such as nonces or session keys. First, we pinpoint f...
Sibylle B. Fröschle
FBIT
2007
IEEE
15 years 5 months ago
Developmental Evaluation in Genetic Programming: A Position Paper
—Standard genetic programming genotypes are generally highly disorganized and poorly structured, with little code replication. This is also true of existing developmental genetic...
Tuan Hao Hoang, Robert I. McKay, Daryl Essam, Nguy...
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 5 months ago
Word Topical Mixture Models for Extractive Spoken Document Summarization
This paper considers extractive summarization of Chinese spoken documents. In contrast to conventional approaches, we attempt to deal with the extractive summarization problem und...
Berlin Chen, Yi-Ting Chen
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
IV
2005
IEEE
161views Visualization» more  IV 2005»
15 years 4 months ago
Adaptive Site Map Visualization Based on Landmarks
Site maps are frequently provided on Web sites as a navigation support for Web users. The automatic generation of site maps is a complex task since the structure of the data, sema...
Dirk Kukulenz