Sciweavers

267 search results - page 34 / 54
» Online Auctions: There Can Be Only One
Sort
View
ASIACRYPT
2009
Springer
15 years 6 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
WWW
2008
ACM
16 years 13 days ago
Knowledge sharing and yahoo answers: everyone knows something
Yahoo Answers (YA) is a large and diverse question-answer forum, acting not only as a medium for sharing technical knowledge, but as a place where one can seek advice, gather opin...
Lada A. Adamic, Jun Zhang, Eytan Bakshy, Mark S. A...
ICPR
2006
IEEE
16 years 26 days ago
New Experiments on ICP-Based 3D Face Recognition and Authentication
In this paper, we discuss new experiments on face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity images,...
Boulbaba Ben Amor, Liming Chen, Mohsen Ardabilian
ICASSP
2011
IEEE
14 years 3 months ago
Increasing discriminative capability on MAP-based mapping function estimation for acoustic model adaptation
In this study, we propose increasing discriminative power on the maximum a posteriori (MAP)-based mapping function estimation for acoustic model adaptation. Based on the effective...
Yu Tsao, Ryosuke Isotani, Hisashi Kawai, Satoshi N...
EUROMICRO
2009
IEEE
15 years 6 months ago
Exercise Generation by Group Models for Autonomous Web-Based Learning
Abstract— Creating exercises for learners requires significant time. This is one reason, beside difficulties of discussing individualized tasks in a classroom setting, why often ...
Michael Sonntag