Sciweavers

1996 search results - page 160 / 400
» Financial Theory 2
Sort
View
CHI
2000
ACM
15 years 9 months ago
Does computer-generated speech manifest personality? an experimental test of similarity-attraction
This study examines whether people would interpret and respond to paralinguistic personality cues in computergenerated speech in the same way as they do human speech. Participants...
Clifford Nass, Kwan Min Lee
163
Voted
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
COMPGEOM
2007
ACM
15 years 8 months ago
On the hardness of minkowski addition and related operations
For polytopes P, Q Rd we consider the intersection P Q; the convex hull of the union CH(P Q); and the Minkowski sum P + Q. We prove that given rational H-polytopes P1, P2, Q it...
Hans Raj Tiwary
PODC
2010
ACM
15 years 8 months ago
Distributed algorithms for edge dominating sets
An edge dominating set for a graph G is a set D of edges such that each edge of G is in D or adjacent to at least one edge in D. This work studies deterministic distributed approx...
Jukka Suomela
157
Voted
CIKM
2006
Springer
15 years 8 months ago
Adaptive non-linear clustering in data streams
Data stream clustering has emerged as a challenging and interesting problem over the past few years. Due to the evolving nature, and one-pass restriction imposed by the data strea...
Ankur Jain, Zhihua Zhang, Edward Y. Chang