Sciweavers

1265 search results - page 27 / 253
» Finding the Key to a Synapse
Sort
View
AAAI
1998
13 years 9 months ago
Machine Learning of Generic and User-Focused Summarization
A key problem in text summarization is finding a salience function which determines what information in the source should be included in the summary. This paper describes the use ...
Inderjeet Mani, Eric Bloedorn
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 7 months ago
Authentication from matrix conjugation
Abstract. We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover's long-term private key. The latter is equivalen...
Dima Grigoriev, Vladimir Shpilrain
CHI
2006
ACM
14 years 8 months ago
Discovering design drivers for mobile media solutions
We conducted user studies in 2000 and 2004 into digital media use, and discovered a number of constant findings even though the studies were separate both in geographically and ch...
Akseli Anttila, Younghee Jung
ISMIR
2004
Springer
150views Music» more  ISMIR 2004»
14 years 1 months ago
Estimating The Tonality Of Polyphonic Audio Files: Cognitive Versus Machine Learning Modelling Strategies
In this paper we evaluate two methods for key estimation from polyphonic audio recordings. Our goal is to compare between a strategy using a cognition-inspired model and several m...
Emilia Gómez, Perfecto Herrera
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 9 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa