Sciweavers

452 search results - page 70 / 91
» date 2010
Sort
View
CCS
2010
ACM
15 years 8 hour ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
CLEF
2010
Springer
15 years 5 hour ago
Creating a Persian-English Comparable Corpus
Multilingual corpora are valuable resources for cross-language information retrieval and are available in many language pairs. However the Persian language does not have rich multi...
Homa Baradaran Hashemi, Azadeh Shakery, Heshaam Fe...
ICASSP
2010
IEEE
15 years 3 hour ago
An alternate approach to adaptive beamforming using SRP-PHAT
An important application for microphone arrays is to extract highquality output from a single wideband source in multi-source and adverse environments. Methods based on blind-sour...
Avram Levi, Harvey F. Silverman
88
Voted
ICASSP
2010
IEEE
15 years 3 hour ago
Matching canvas weave patterns from processing x-ray images of master paintings
Thread counting algorithms seek to determine from x-ray images the vertical and horizontal thread counts (frequencies) of the canvas weave comprising a painting’s support. Our s...
Don H. Johnson, Lucia Sun, C. Richard Johnson Jr.,...
ICASSP
2010
IEEE
15 years 2 hour ago
Vocabulary and language model adaptation using just one speech file
This paper investigates unsupervised vocabulary and language model self-adaptation (VLA) from just one speech file using the web as a knowledge source and without prior knowledge...
Sha Meng, Kishan Thambiratnam, Yimeng Lin, Lifang ...