Sciweavers

1628 search results - page 245 / 326
» Compiler Construction Using Scheme
Sort
View
ICMCS
2007
IEEE
214views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Exploring Discriminative Learning for Text-Independent Speaker Recognition
Speaker verification is a technology of verifying the claimed identity of a speaker based on the speech signal from the speaker (voice print). To learn the score of similarity be...
Ming Liu, Zhengyou Zhang, Mark Hasegawa-Johnson, T...
GLOBECOM
2006
IEEE
14 years 4 months ago
Scalable Design of Space-Time Trellis Code with Low Decoding Complexity
—Design of space-time codes that scale with the number of transmit antennas is a difficult problem. In this paper, we introduce a new family of space-time trellis codes (STTC) th...
Kyungmin Kim, Hamid R. Sadjadpour, Rick S. Blum, Y...
ASIACRYPT
2005
Springer
14 years 3 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
SCN
2004
Springer
102views Communications» more  SCN 2004»
14 years 3 months ago
On the Size of Monotone Span Programs
Abstract. Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
LICS
2002
IEEE
14 years 3 months ago
A Syntactic Approach to Foundational Proof-Carrying Code
Proof-Carrying Code (PCC) is a general framework for verifying the safety properties of machine-language programs. PCC proofs are usually written in a logic extended with language...
Nadeem Abdul Hamid, Zhong Shao, Valery Trifonov, S...