Sciweavers

930 search results - page 94 / 186
» A Universal Encryption Standard
Sort
View
CSL
2010
Springer
13 years 11 months ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek
ICASSP
2009
IEEE
14 years 4 months ago
Comparing maximum a posteriori vector quantization and Gaussian mixture models in speaker verification
Gaussian mixture model - universal background model (GMMUBM) is a standard reference classifier in speaker verification. We have recently proposed a simplified model using vect...
Tomi Kinnunen, Juhani Saastamoinen, Ville Hautam&a...
W4A
2006
ACM
14 years 4 months ago
Designing beneath the surface of the web
At its most basic, the web allows for two modes of access: visual and non-visual. For the most part, our design attention is focused on making decisions that affect the visual, or...
Sarah Horton
MSE
1999
IEEE
118views Hardware» more  MSE 1999»
14 years 2 months ago
Training IP Creators and Integrators
Intellectual property IP blocks are being created for reuse and marketed as a means of reducing the development time of complex designs. This in turn leads to a reduction in time ...
Donald W. Bouldin, Senthil Natarajan, Benjamin A. ...
WEBNET
2000
13 years 11 months ago
How the Wild Wide Web was Won: Online Web Developer Training
: As the Web grows in importance in institutional settings, so does the need for training. Universities are looking at the daunting task of putting more information and services on...
John Sharkey, Kitzzy Aviles, Barbara Ferguson