Sciweavers

813 search results - page 61 / 163
» Pipeline-centric provenance model
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Discriminatively trained Probabilistic Linear Discriminant Analysis for speaker verification
Recently, i-vector extraction and Probabilistic Linear Discriminant Analysis (PLDA) have proven to provide state-of-the-art speaker verification performance. In this paper, the s...
Lukas Burget, Oldrich Plchot, Sandro Cumani, Ondre...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 4 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
14 years 4 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
FLAIRS
2007
14 years 12 days ago
Mining Sequences in Distributed Sensors Data for Energy Production
The desire to predict power generation at a given point in time is essential to power scheduling, energy trading, and availability modeling. The research conducted within is conce...
Mehmed M. Kantardzic, John Gant
JMLR
2010
192views more  JMLR 2010»
13 years 4 months ago
Inducing Tree-Substitution Grammars
Inducing a grammar from text has proven to be a notoriously challenging learning task despite decades of research. The primary reason for its difficulty is that in order to induce...
Trevor Cohn, Phil Blunsom, Sharon Goldwater