Sciweavers

948 search results - page 22 / 190
» How People use Words to Make Meanings
Sort
View
IUI
2005
ACM
14 years 2 months ago
How to wreck a nice beach you sing calm incense
A principal problem in speech recognition is distinguishing between words and phrases that sound similar but have different meanings. Speech recognition programs produce a list of...
Henry Lieberman, Alexander Faaborg, Waseem Daher, ...
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
14 years 2 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
ITICSE
2004
ACM
14 years 1 months ago
What do we mean by theoretically sound research in computer science education?
With our interest to improve our education in computer science, an understanding of how students learn about CS concepts, how different concepts are understood, as well as the con...
Mordechai Ben-Ari, Anders Berglund, Shirley Booth,...
ADBIS
2010
Springer
181views Database» more  ADBIS 2010»
13 years 10 months ago
Stones Falling in Water: When and How to Restructure a View-Based Relational Database
Nowadays, one of the most important problems of software engineering continues to be the maintenance of both databases and applications. It is clear that any method that can reduce...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
CHES
2007
Springer
126views Cryptology» more  CHES 2007»
14 years 2 months ago
How to Maximize the Potential of FPGA Resources for Modular Exponentiation
This paper describes a modular exponentiation processing method and circuit architecture that can exhibit the maximum performance of FPGA resources. The modular exponentiation arch...
Daisuke Suzuki