Random search

Results: 189



#Item
71INTEGRATING META-INFORMATION INTO EXEMPLAR-BASED SPEECH RECOGNITION WITH SEGMENTAL CONDITIONAL RANDOM FIELDS Kris Demuynck, Dino Seppi, Dirk Van Compernolle∗ Patrick Nguyen, Geoffrey Zweig

INTEGRATING META-INFORMATION INTO EXEMPLAR-BASED SPEECH RECOGNITION WITH SEGMENTAL CONDITIONAL RANDOM FIELDS Kris Demuynck, Dino Seppi, Dirk Van Compernolle∗ Patrick Nguyen, Geoffrey Zweig

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-24 11:58:14
72Hidden Conditional Random Fields with Distributed User Embeddings for Ad Targeting Nemanja Djuric, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati Yahoo Labs 701 First Avenue, Sunnyvale, CA 94089, USA e-mail:

Hidden Conditional Random Fields with Distributed User Embeddings for Ad Targeting Nemanja Djuric, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati Yahoo Labs 701 First Avenue, Sunnyvale, CA 94089, USA e-mail:

Add to Reading List

Source URL: astro.temple.edu

Language: English - Date: 2014-12-18 04:32:42
73Boilerplate Detection using Shallow Text Features Christian Kohlschütter, Peter Fankhauser, Wolfgang Nejdl L3S Research Center / Leibniz Universität Hannover Appelstr. 9a, 30167 Hannover Germany

Boilerplate Detection using Shallow Text Features Christian Kohlschütter, Peter Fankhauser, Wolfgang Nejdl L3S Research Center / Leibniz Universität Hannover Appelstr. 9a, 30167 Hannover Germany

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:09:34
74DATASHEET SEARCH SITE | WWW.ALLDATASHEET.COM

DATASHEET SEARCH SITE | WWW.ALLDATASHEET.COM

Add to Reading List

Source URL: hextechsecurity.com

Language: English - Date: 2011-02-23 15:43:59
75Hidden Conditional Random Fields with Distributed User Embeddings for Ad Targeting Nemanja Djuric, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati Yahoo Labs 701 First Avenue, Sunnyvale, CA 94089, USA e-mail:

Hidden Conditional Random Fields with Distributed User Embeddings for Ad Targeting Nemanja Djuric, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati Yahoo Labs 701 First Avenue, Sunnyvale, CA 94089, USA e-mail:

Add to Reading List

Source URL: labs.yahoo.com

Language: English - Date: 2014-10-26 23:12:23
76Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
77Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search

Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-28 14:37:53
78Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France  ?

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
79Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
80— A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

— A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-19 16:42:35