Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Abstract. This paper describes the 2007 meeting speech-to-text system for lecture rooms developed at the Interactive Systems Laboratories (ISL), for the multiple distant microphone...
Mobile computing technologies and social software have given new challenges to technology-enhanced learning. Simple e-learning system personalization, adaptation and authoring beco...
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...