Sciweavers

525 search results - page 21 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
ASIACRYPT
2004
Springer
14 years 1 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
ACL
2012
11 years 10 months ago
How Are Spelling Errors Generated and Corrected? A Study of Corrected and Uncorrected Spelling Errors Using Keystroke Logs
This paper presents a comparative study of spelling errors that are corrected as you type, vs. those that remain uncorrected. First, we generate naturally occurring online error c...
Yukino Baba, Hisami Suzuki
GLOBECOM
2010
IEEE
13 years 5 months ago
Throughput and Energy Efficiency of Opportunistic Routing with Type-I HARQ in Linear Multihop Networks
Opportunistic routing is a well-known technique that exploits the broadcast nature of wireless transmissions and path diversity to form the route in an adaptive manner based on cur...
Davide Chiarotto, Osvaldo Simeone, Michele Zorzi
LREC
2010
169views Education» more  LREC 2010»
13 years 9 months ago
Identification of the Question Focus: Combining Syntactic Analysis and Ontology-based Lookup through the User Interaction
Most question-answering systems contain a classifier module which determines a question category, based on which each question is assigned an answer type. However, setting up synt...
Danica Damljanovic, Milan Agatonovic, Hamish Cunni...
ISCAS
2005
IEEE
142views Hardware» more  ISCAS 2005»
14 years 1 months ago
Automatic video region-of-interest determination based on user attention model
—This paper presents a framework for automatic video region-of-interest determination based on user attention model. In this work, a set of attempts on using video attention feat...
Wen-Huang Cheng, Wei-Ta Chu, Jin-Hau Kuo, Ja-Ling ...