Sciweavers

813 search results - page 16 / 163
» Pipeline-centric provenance model
Sort
View
SIAMAM
2008
76views more  SIAMAM 2008»
13 years 7 months ago
Stability of Solitary Waves in a Semiconductor Drift-Diffusion Model
We consider a macroscopic (drift-diffusion) model describing a simple microwave generator, consisting of a special type of semiconductor material that, when biased above a certain ...
C. M. Cuesta, C. Schmeiser
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 2 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
14 years 1 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
ACL
2010
13 years 5 months ago
Latent Variable Models of Selectional Preference
This paper describes the application of so-called topic models to selectional preference induction. Three models related to Latent Dirichlet Allocation, a proven method for modell...
Diarmuid Ó Séaghdha
INTERSPEECH
2010
13 years 2 months ago
Hidden Markov models with context-sensitive observations for grapheme-to-phoneme conversion
Hidden Markov models (HMMs) have proven useful in various aspects of speech technology from automatic speech recognition through speech synthesis, speech segmentation and grapheme...
Udochukwu Kalu Ogbureke, Peter Cahill, Julie Carso...