Sciweavers

3190 search results - page 134 / 638
» cans 2011
Sort
View
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
14 years 4 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...
205
Voted
HCI
2011
14 years 4 months ago
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation
Almost 20% of big earthquakes in the world occur in Japan. It becomes impossible for private companies and governments to carry out their business if they suffer from severe damage...
Ryuhei Kaneko, Yoshio Nakatani
HCI
2011
14 years 4 months ago
Practical Aspects of Running Experiments with Human Participants
There can often be a gap between theory and its implications for practice in human-behavioral studies. This gap can be particularly significant outside psychology departments. Most...
Frank E. Ritter, Jong W. Kim, Jonathan H. Morgan, ...
156
Voted
ICANN
2011
Springer
14 years 4 months ago
Learning from Multiple Annotators with Gaussian Processes
Abstract. In many supervised learning tasks it can be costly or infeasible to obtain objective, reliable labels. We may, however, be able to obtain a large number of subjective, po...
Perry Groot, Adriana Birlutiu, Tom Heskes
116
Voted
ICASSP
2011
IEEE
14 years 4 months ago
A basis method for robust estimation of constrained MLLR
Constrained Maximum Likelihood Linear Regression (CMLLR) is a widely used speaker adaptation technique in which an affine transform of the features is estimated for each speaker....
Daniel Povey, Kaisheng Yao