Sciweavers

431 search results - page 44 / 87
» We have always been transgenic
Sort
View
ICASSP
2007
IEEE
14 years 3 months ago
Blind Speech Separation in a Meeting Situation with Maximum SNR Beamformers
We propose a speech separation method for a meeting situation, where each speaker sometimes speaks and the number of speakers changes every moment. Many source separation methods ...
Shoko Araki, Hiroshi Sawada, Shoji Makino
AIHC
2007
Springer
14 years 3 months ago
Instinctive Computing
Instinctive computing is a computational simulation of biological and cognitive instincts. It is a meta-program of life, just like universal gravity in nature. It profoundly influe...
Yang Cai
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
EUROCRYPT
2010
Springer
14 years 1 months ago
Partial Fairness in Secure Two-Party Computation
A seminal result of Cleve (STOC ’86) is that, in general, complete fairness is impossible to achieve in two-party computation. In light of this, various techniques for obtaining...
S. Dov Gordon, Jonathan Katz