Sciweavers

2194 search results - page 247 / 439
» Improving HLRTA*( k )
Sort
View
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 8 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
SPEECH
2011
14 years 8 months ago
The Romanian speech synthesis (RSS) corpus: Building a high quality HMM-based speech synthesis system using a high sampling rate
This paper first introduces a newly-recorded high quality Romanian speech corpus designed for speech synthesis, called “RSS”, along with Romanian front-end text processing mo...
Adriana Stan, Junichi Yamagishi, Simon King, Matth...
CHI
2011
ACM
14 years 5 months ago
Utilizing multimedia capabilities of mobile phones to support teaching in schools in rural panama
Providing good education is one of the major challenges for humanity. In many developing regions in the world improving educational standards is seen as a central building block f...
Elba del Carmen Valderrama Bahamóndez, Chri...
COCO
2011
Springer
217views Algorithms» more  COCO 2011»
14 years 1 months ago
Noisy Interpolation of Sparse Polynomials, and Applications
Let f ∈ Fq[x] be a polynomial of degree d ≤ q/2. It is well-known that f can be uniquely recovered from its values at some 2d points even after some small fraction of the valu...
Shubhangi Saraf, Sergey Yekhanin
IACR
2011
207views more  IACR 2011»
14 years 1 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li