Random search

Results: 189



#Item
71Computational linguistics / Speech recognition / Automatic identification and data capture / Computer accessibility / Dynamic time warping / Template matching / Search engine indexing / Template / Word error rate / Information science / Computing / Software

INTEGRATING META-INFORMATION INTO EXEMPLAR-BASED SPEECH RECOGNITION WITH SEGMENTAL CONDITIONAL RANDOM FIELDS Kris Demuynck, Dino Seppi, Dirk Van Compernolle∗ Patrick Nguyen, Geoffrey Zweig

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-24 11:58:14
72Advertising / Compensation / Pricing / Online advertising / Search advertising / Pay per click / Behavioral targeting / Electronic commerce / Internet / Marketing / Internet marketing

Hidden Conditional Random Fields with Distributed User Embeddings for Ad Targeting Nemanja Djuric, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati Yahoo Labs 701 First Avenue, Sunnyvale, CA 94089, USA e-mail:

Add to Reading List

Source URL: astro.temple.edu

Language: English - Date: 2014-12-18 04:32:42
73Statistics / Statistical classification / Computational linguistics / Data mining / Information retrieval / Boilerplate / Search engine indexing / Random access machine / Classification rule / Science / Natural language processing / Information science

Boilerplate Detection using Shallow Text Features Christian Kohlschütter, Peter Fankhauser, Wolfgang Nejdl L3S Research Center / Leibniz Universität Hannover Appelstr. 9a, 30167 Hannover Germany

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:09:34
74Electronics / Electronic engineering / 555 timer IC / Dynamic random-access memory / Quad Data Rate SRAM / Computer memory / NvSRAM / Static random-access memory

DATASHEET SEARCH SITE | WWW.ALLDATASHEET.COM

Add to Reading List

Source URL: hextechsecurity.com

Language: English - Date: 2011-02-23 15:43:59
75Advertising / Compensation / Pricing / Online advertising / Search advertising / Pay per click / Behavioral targeting / Electronic commerce / Internet / Marketing / Internet marketing

Hidden Conditional Random Fields with Distributed User Embeddings for Ad Targeting Nemanja Djuric, Vladan Radosavljevic, Mihajlo Grbovic, Narayan Bhamidipati Yahoo Labs 701 First Avenue, Sunnyvale, CA 94089, USA e-mail:

Add to Reading List

Source URL: labs.yahoo.com

Language: English - Date: 2014-10-26 23:12:23
76Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
77Physical Unclonable Function / Coding theory / Data transmission / Computer arithmetic / Hamming / Forward error correction / Bit error rate / Hardware random number generator / VEST / Cryptography / Randomness / Error detection and correction

Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-28 14:37:53
78Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
79Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
80Search algorithms / Computational complexity theory / Random oracle / Interactive proof system / Hash function / Zero-knowledge proof / Universal hashing / Collision resistance / Hash list / Cryptography / Cryptographic hash functions / Hashing

— A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-19 16:42:35
UPDATE