Sciweavers

766 search results - page 11 / 154
» How to Read a Signature
Sort
View
CHI
2010
ACM
14 years 2 months ago
Eye tracking analysis of preferred reading regions on the screen
We report on an exploratory study analyzing preferred reading regions on a monitor using eye tracking. We show that users have individually preferred reading regions, varying in l...
Georg Buscher, Ralf Biedert, Daniel Heinesch, Andr...
NAACL
2004
13 years 8 months ago
Robust Reading: Identification and Tracing of Ambiguous Names
A given entity, representing a person, a location or an organization, may be mentioned in text in multiple, ambiguous ways. Understanding natural language requires identifying whe...
Xin Li, Paul Morie, Dan Roth
AIED
2009
Springer
14 years 2 months ago
Automated Assessment of Oral Reading Prosody
We describe an automated method to assess the expressiveness of children’s oral reading by measuring how well its prosodic contours correlate in pitch, intensity, pauses, and wor...
Jack Mostow, Minh Duong
TCOM
2010
162views more  TCOM 2010»
13 years 2 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
13 years 11 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert