Sciweavers

3092 search results - page 67 / 619
» Where are you pointing
Sort
View
CHI
2002
ACM
16 years 5 months ago
SCANMail: a voicemail interface that makes speech browsable, readable and searchable
Increasing amounts of public, corporate, and private speech data are now available on-line. These are limited in their usefulness, however, by the lack of tools to permit their br...
Steve Whittaker, Julia Hirschberg, Brian Amento, L...
DGCI
2003
Springer
15 years 10 months ago
Shape Similarity and Visual Parts
Abstract. Human perception of shape is based on visual parts of objects to a point that a single, significant visual part is sufficient to recognize the whole object. For example,...
Longin Jan Latecki, Rolf Lakämper, Diedrich W...
ISCA
2010
IEEE
176views Hardware» more  ISCA 2010»
15 years 9 months ago
Forwardflow: a scalable core for power-constrained CMPs
Chip Multiprocessors (CMPs) are now commodity hardware, but commoditization of parallel software remains elusive. In the near term, the current trend of increased coreper-socket c...
Dan Gibson, David A. Wood
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 9 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
FSTTCS
2005
Springer
15 years 11 months ago
No Coreset, No Cry: II
Let P be a set of n points in d-dimensional Euclidean space, where each of the points has integer coordinates from the range [−∆, ∆],
Michael Edwards, Kasturi R. Varadarajan