— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
We present Parakeet, a system for continuous speech recognition on mobile touch-screen devices. The design of Parakeet was guided by computational experiments and validated by a u...
We report the design and evaluation of a novel game controller text entry method called TwoStick. The design is based on the review of previous work and several rounds of pilot te...
This paper addresses selecting between candidate pronunciations for out-of-vocabulary words in speech processing tasks. We introduce a simple, unsupervised method that outperforms...
Christopher M. White, Abhinav Sethy, Bhuvana Ramab...