Sciweavers

1222 search results - page 165 / 245
» Some Results on Directable Automata
Sort
View
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
15 years 1 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu
SAIG
2000
Springer
15 years 1 months ago
Compiling Embedded Languages
Abstract. Functional languages are particularly well-suited to the implementation of interpreters for domain-specific embedded languages (DSELs). We describe an implemented techniq...
Conal Elliott, Sigbjorn Finne, Oege de Moor
86
Voted
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
CCS
2010
ACM
15 years 1 months ago
Towards publishing recommendation data with predictive anonymization
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
Chih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang...
AAAI
2007
15 years 15 days ago
Stochastic Optimization for Collision Selection in High Energy Physics
Artificial intelligence has begun to play a critical role in basic science research. In high energy physics, AI methods can aid precision measurements that elucidate the underlyi...
Shimon Whiteson, Daniel Whiteson