Sciweavers

12194 search results - page 96 / 2439
» cans 2010
Sort
View
IJNSEC
2010
91views more  IJNSEC 2010»
13 years 4 months ago
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem...
Yong Zeng, Jianfeng Ma, Sang-Jae Moon
IJSIR
2010
122views more  IJSIR 2010»
13 years 4 months ago
Biases in Particle Swarm Optimization
It is known that the most common versions of particle swarm optimization (PSO) algorithms are rotationally variant. It has also been pointed out that PSO algorithms can concentrat...
William M. Spears, Derek T. Green, Diana F. Spears
INTERSPEECH
2010
13 years 4 months ago
Voice search for development
In light of the serious problems with both illiteracy and information access in the developing world, there is a widespread belief that speech technology can play a significant ro...
Etienne Barnard, Johan Schalkwyk, Charl Johannes v...
INTERSPEECH
2010
13 years 4 months ago
Active word learning under uncertain input conditions
In this paper we investigate a computational model of word learning that is cognitively plausible. The model is partly trained on incorrect form-referent pairings, modelling the i...
Maarten Versteegh, Louis ten Bosch, Lou Boves
INTERSPEECH
2010
13 years 4 months ago
Exploring speaker characteristics for meeting summarization
In this paper, we investigate using meeting-specific characteristics to improve extractive meeting summarization, in particular, speaker-related attributes (such as verboseness, g...
Fei Liu, Yang Liu