We consider a macroscopic (drift-diffusion) model describing a simple microwave generator, consisting of a special type of semiconductor material that, when biased above a certain ...
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
This paper describes the application of so-called topic models to selectional preference induction. Three models related to Latent Dirichlet Allocation, a proven method for modell...
Hidden Markov models (HMMs) have proven useful in various aspects of speech technology from automatic speech recognition through speech synthesis, speech segmentation and grapheme...
Udochukwu Kalu Ogbureke, Peter Cahill, Julie Carso...