We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 672 results
  1. Tight Bounds on the Randomness Complexity of Secure Multiparty Computation

    We revisit the question of minimizing the randomness complexity of protocols for secure multiparty computation (MPC) in the setting of perfect...
    Vipul Goyal, Yuval Ishai, Yifan Song in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  2. A novel focus encoding scheme for addressee detection in multiparty interaction using machine learning algorithms

    Addressee detection is a fundamental task for seamless dialogue management and turn taking in human-agent interaction. Though addressee detection is...

    Usman Malik, Mukesh Barange, ... Alexandre Pauchet in Journal on Multimodal User Interfaces
    Article 17 January 2021
  3. A survey of discourse parsing

    Discourse parsing is an important research area in natural language processing (NLP), which aims to parse the discourse structure of coherent...

    Jiaqi Li, Ming Liu, ... Ting Liu in Frontiers of Computer Science
    Article 20 January 2022
  4. Microsoft Teams Phone (Voice) Configuration and Management

    Teams brings together calling, meeting, chat collaboration, and apps, thereby hel** users easily stay connected right in their workflow. Microsoft...
    Balu N Ilag, Arun M Sabale in Troubleshooting Microsoft Teams
    Chapter 2022
  5. Differentially private multi-agent constraint optimization

    Distributed constraint optimization (DCOP) is a framework in which multiple agents with private constraints (or preferences) cooperate to achieve a...

    Sankarshan Damle, Aleksei Triastcyn, ... Sujit Gujar in Autonomous Agents and Multi-Agent Systems
    Article 02 March 2024
  6. Exploring Type-Level Bisimilarity towards More Expressive Multiparty Session Types

    A key open problem with multiparty session types (MPST) concerns their expressiveness: current MPST have inflexible choice, no existential...
    Sung-Shik Jongmans, Nobuko Yoshida in Programming Languages and Systems
    Conference paper Open access 2020
  7. Audio-video fusion strategies for active speaker detection in meetings

    Meetings are a common activity in professional contexts, and it remains challenging to endow vocal assistants with advanced functionalities to...

    Lionel Pibre, Francisco Madrigal, ... Isabelle Ferrané in Multimedia Tools and Applications
    Article 28 September 2022
  8. Towards Multiparty Computation Withstanding Coercion of All Parties

    Incoercible multi-party computation [Canetti-Gennaro’96] allows parties to engage in secure computation with the additional guarantee that the public...
    Ran Canetti, Oxana Poburinnaya in Theory of Cryptography
    Conference paper 2020
  9. Testing Equality Under the Local Broadcast Model

    In the multiparty equality problem, each of the n nodes starts with a k-bit input. If there is a mismatch between the inputs, then at least one node...
    Muhammad Samir Khan, Nitin H. Vaidya in Structural Information and Communication Complexity
    Conference paper 2021
  10. Explorations in multiparty casual social talk and its relevance for social human machine dialogue

    Much talk between humans is face-to-face, casual, multiparty, and of indefinite duration. Such casual conversation or social talk facilitates social...

    Emer Gilmartin, Benjamin R. Cowan, ... Nick Campbell in Journal on Multimodal User Interfaces
    Article 10 September 2018
  11. Privacy-Preserving Federated Learning System (f-PPLS) for military focused area classification

    Accurate classification of military-focused areas using machine learning techniques is crucial for meeting military criteria. However, preserving...

    Priya Arora, Vikas Khullar, ... Renu Popli in Multimedia Tools and Applications
    Article 21 May 2024
  12. CAPABARA: A Combined Attack on CAPA

    Physical attacks pose a substantial threat to the secure implementation of cryptographic algorithms. While considerable research efforts are...
    Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2024
  13. Marginal Release Under Multi-party Personalized Differential Privacy

    Given a set of local datasets held by multiple parties, we study the problem of learning marginals over the integrated dataset while satisfying...
    Peng Tang, Rui Chen, ... Shanqing Guo in Machine Learning and Knowledge Discovery in Databases
    Conference paper 2023
  14. Chunks in Multiparty Conversation—Building Blocks for Extended Social Talk

    Building applications which can form a longer term social bond with a user or engage with a group of users calls for knowledge of how longer...
    Emer Gilmartin, Benjamin R. Cowan, ... Nick Campbell in Advanced Social Interaction with Agents
    Chapter 2019
  15. Towards privacy preserved document image classification: a comprehensive benchmark

    As data-driven AI systems become increasingly integrated into industry, concerns have recently arisen regarding potential privacy breaches and the...

    Saifullah Saifullah, Dominique Mercier, ... Sheraz Ahmed in International Journal on Document Analysis and Recognition (IJDAR)
    Article 18 June 2024
  16. Survey on user perceived system factors influencing the QoE of audiovisual calls on smartphones

    With the widespread use of applications and services supporting audiovisual calls via smartphones, both in business and leisure contexts, a key...

    Dunja Vučić, Sabina Baraković, Lea Skorin-Kapov in Multimedia Tools and Applications
    Article 30 November 2022
  17. Multiparty gaze preservation through perspective switching for interactive elearning environments

    Existing live tele-teaching systems enable eye-contact between interacting participants, however, they are often incomplete as they neglect finer...

    Ramkumar Narayanan, Venkat P Rangan, ... Balaji Hariharan in Multimedia Tools and Applications
    Article 08 January 2019
  18. Privacy-Preserving Data Mining

    The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The...
    C. Clifton, M. Kantarcıoğlu, J. Vaidya in Foundations and Advances in Data Mining
    Chapter
  19. The Impact of Packet Loss and Google Congestion Control on QoE for WebRTC-Based Mobile Multiparty Audiovisual Telemeetings

    While previous expensive and complex desktop video conferencing solutions had a restricted reach, the emergence of the WebRTC (Web Real-Time...
    Dunja Vucic, Lea Skorin-Kapov in MultiMedia Modeling
    Conference paper 2019
  20. Performance Evaluation of Multiparty Authentication in 5G IIoT Environments

    With the rapid development of various emerging technologies such as the Industrial Internet of Things (IIoT), there is a need to secure...
    Hussain Al-Aqrabi, Phil Lane, Richard Hill in Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health
    Conference paper 2019
Did you find what you were looking for? Share feedback.