A key problem in text summarization is finding a salience function which determines what information in the source should be included in the summary. This paper describes the use ...
Abstract. We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter is equivalen...
We conducted user studies in 2000 and 2004 into digital media use, and discovered a number of constant findings even though the studies were separate both in geographically and ch...
In this paper we evaluate two methods for key estimation from polyphonic audio recordings. Our goal is to compare between a strategy using a cognition-inspired model and several m...
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...