Sciweavers

1518 search results - page 180 / 304
» Cryptographic Test Correction
Sort
View
DMS
2010
147views Multimedia» more  DMS 2010»
14 years 10 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper
95
Voted
EMNLP
2010
14 years 10 months ago
Using Unknown Word Techniques to Learn Known Words
Unknown words are a hindrance to the performance of hand-crafted computational grammars of natural language. However, words with incomplete and incorrect lexical entries pose an e...
Kostadin Cholakov, Gertjan van Noord
111
Voted
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 7 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
110
Voted
WWW
2011
ACM
14 years 7 months ago
Query completion without query logs for song search
We describe a new method for query completion for Bollywood song search without using query logs. Since song titles in nonEnglish languages (Hindi in our case) are mostly present ...
Nitin Dua, Kanika Gupta, Monojit Choudhury, Kalika...
ICASSP
2011
IEEE
14 years 4 months ago
Speaker verification by inexperienced and experienced listeners vs. speaker verification system
This paper describes the participation of the LIA in the Human Assisted Speaker Recognition (HASR) task of the NIST-SRE 2010 evaluation campaign and its extension to a larger numb...
Juliette Kahn, Nicolas Audibert, Solange Rossato, ...