Sciweavers

681 search results - page 66 / 137
» et 2006
Sort
View
ASIACRYPT
2006
Springer
15 years 1 months ago
Improved Collision Search for SHA-0
At CRYPTO2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed a collision attack on SHA-0 that could generate a collision with complexity 239 SHA-0 hash operations. Although t...
Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Ya...
FC
2006
Springer
107views Cryptology» more  FC 2006»
15 years 1 months ago
Efficient Broadcast Encryption Scheme with Log-Key Storage
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...
Yong Ho Hwang, Pil Joong Lee
LREC
2008
118views Education» more  LREC 2008»
14 years 11 months ago
What would you Ask a conversational Agent? Observations of Human-Agent Dialogues in a Museum Setting
Embodied Conversational Agents have typically been constructed for use in limited domain applications, and tested in very specialized environments. Only in recent years have there...
Susan Robinson, David R. Traum, Midhun Ittycheriah...
ACL
2006
14 years 11 months ago
A Progressive Feature Selection Algorithm for Ultra Large Feature Spaces
Recent developments in statistical modeling of various linguistic phenomena have shown that additional features give consistent performance improvements. Quite often, improvements...
Qi Zhang, Fuliang Weng, Zhe Feng
66
Voted
FSS
2006
86views more  FSS 2006»
14 years 9 months ago
An omission approach for detecting outliers in fuzzy regression models
Since Tanaka et al. in 1982 proposed a study in linear regression with a fuzzy model, fuzzy regression analysis has been widely studied and applied in various areas. However, Tana...
Wen-Liang Hung, Miin-Shen Yang