Sciweavers

2648 search results - page 37 / 530
» Human Factors In Computer Security
Sort
View
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
15 years 10 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
AAAI
2007
15 years 2 days ago
Modeling Reciprocal Behavior in Human Bilateral Negotiation
Reciprocity is a key determinant of human behavior and has been well documented in the psychological and behavioral economics literature. This paper shows that reciprocity has sig...
Ya'akov Gal, Avi Pfeffer
NIPS
2004
14 years 11 months ago
Real-Time Pitch Determination of One or More Voices by Nonnegative Matrix Factorization
An auditory "scene", composed of overlapping acoustic sources, can be viewed as a complex object whose constituent parts are the individual sources. Pitch is known to be...
Fei Sha, Lawrence K. Saul
MM
2006
ACM
115views Multimedia» more  MM 2006»
15 years 3 months ago
Human-centered computing: a multimedia perspective
Human-Centered Computing (HCC) is a set of methodologies that apply to any field that uses computers, in any form, in applications in which humans directly interact with devices o...
Alejandro Jaimes, Nicu Sebe, Daniel Gatica-Perez
ECCV
2006
Springer
15 years 11 months ago
Multi-way Clustering Using Super-Symmetric Non-negative Tensor Factorization
Abstract. We consider the problem of clustering data into k 2 clusters given complex relations -- going beyond pairwise -- between the data points. The complex n-wise relations ar...
Amnon Shashua, Ron Zass, Tamir Hazan