Sciweavers

700 search results - page 51 / 140
» et 2008
Sort
View
ISPEC
2011
Springer
12 years 10 months ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
LREC
2008
114views Education» more  LREC 2008»
13 years 9 months ago
A Study of Parentheticals in Discourse Corpora - Implications for NLG Systems
This paper presents a corpus study of parenthetical constructions in two different corpora: the Penn Discourse Treebank (PDTB, (PDTBGroup, 2008)) and the RST Discourse Treebank (C...
Eva Banik, Alan Lee
ICONIP
2008
13 years 9 months ago
On Similarity Measures for Spike Trains
A variety of (dis)similarity measures for one-dimensional point processes (e.g., spike trains) are investigated, including the Victor-Purpura distance metric, the van Rossum distan...
Justin Dauwels, François B. Vialatte, Theop...
LREC
2008
143views Education» more  LREC 2008»
13 years 9 months ago
Enriching the Venice Italian Treebank with Dependency and Grammatical Relations
In this paper we propose a rule-based approach to extract dependency and grammatical relations from the Venice Italian Treebank (VIT) (Delmonte et al., 2007) with bracketed tree s...
Sara Tonelli, Rodolfo Delmonte, Antonella Bristot
LREC
2008
118views Education» more  LREC 2008»
13 years 9 months ago
What would you Ask a conversational Agent? Observations of Human-Agent Dialogues in a Museum Setting
Embodied Conversational Agents have typically been constructed for use in limited domain applications, and tested in very specialized environments. Only in recent years have there...
Susan Robinson, David R. Traum, Midhun Ittycheriah...