Sciweavers

568 search results - page 97 / 114
» From Machine Translation to Computer Assisted Translation us...
Sort
View
69
Voted
CVPR
2001
IEEE
15 years 11 months ago
Learning Flexible Sprites in Video Layers
See a PPT file with videos at www.research.microsoft.com/users/jojic/FlexiblesSprites.htm We propose a technique for automatically learning layers of "flexible sprites" ...
Nebojsa Jojic, Brendan J. Frey
TIT
2011
125views more  TIT 2011»
14 years 4 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
89
Voted
IADIS
2004
14 years 11 months ago
Mastering the mystery through 'SAIQ' metrics of user experience in telecollaboration business systems
In the preparation of technology transition, the contextual and alternative definitions of the usability heuristics of multifaceted role of the best practice methodology of Teleco...
Venkatesh Mahadevan, Zenon Chaczko, Robin Braun
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
15 years 10 months ago
Model Based Test Generation for Microprocessor Architecture Validation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. Traditionally, the different components (or validation collaterals) used i...
Sreekumar V. Kodakara, Deepak Mathaikutty, Ajit Di...