Sciweavers

953 search results - page 136 / 191
» A note on the paper
Sort
View
WOTE
2010
13 years 6 months ago
Receipt-Free K-out-of-L Voting Based on ElGamal Encryption
We present a K-out-of-L voting scheme, i.e., a voting scheme that allows every voter to vote for (up to) K candidates from a set of L candidates. The scheme is receipt-free, which ...
Martin Hirt
BMVC
2010
13 years 5 months ago
High Five: Recognising human interactions in TV shows
In this paper we address the problem of recognising interactions between two people in realistic scenarios for video retrieval purposes. We develop a per-person descriptor that us...
Alonso Patron, Marcin Marszalek, Andrew Zisserman,...
FOCS
2010
IEEE
13 years 5 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
ACL
2009
13 years 5 months ago
Phrase-Based Statistical Machine Translation as a Traveling Salesman Problem
An efficient decoding algorithm is a crucial element of any statistical machine translation system. Some researchers have noted certain similarities between SMT decoding and the f...
Mikhail Zaslavskiy, Marc Dymetman, Nicola Cancedda
EKNOW
2009
13 years 5 months ago
Towards a Context-Based Dialog Management Layer for Expert Systems
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...