Publications
-
Proving Authentication Properties in the Protocol Derivation Assistant
In the present paper, we introduce an axiomatic theory of authentication suitable for the automatic proof of authentication properties. We describe a proof of the authentication property of a simple…
-
Privacy enhancing technologies; proceedings of the 6th International Workshop (PET 2006)
The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was held at Robinson College, Cambridge (UK) on June 28-20, 2006.
-
Tides: Report On Technical Quality Of 7th Grade Student Assessment
This report describes activities undertaken to create, pilot, and analyze technical quality of student assessments in seventh grade for the Transforming Instruction by Design in Earth Science (TIDES) project.
-
Metatheoretic Plan Summarization and Comparison
We describe a domain-independent framework for plan summarization and comparison that can help a human understand both key strategic elements of an individual plan and important differences among plans.
-
Improvements in MLLR-Transform-based Speaker Recognition
We previously proposed the use of MLLR transforms derived from a speech recognition system as speaker features in a speaker verification system. In this paper we report recent improvements to…
-
A Study of Intentional Voice Modifications for Evading Automatic Speaker Recognition
We investigate the effect of intentional voice modifications on a state-of-the-art speaker recognition system. The investigation includes data collection, where normal and changed voices are collected from subjects conversing by…
-
Information scent and Web navigation: theory, models and automated usability evaluation
-
Continuous Refinement of Agent Resource Estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek to define and maintain…
-
Generalized Linear Kernels for One-Versus-All Classification: Application to Speaker Recognition
In this paper, we examine the problem of kernel selection for one-versus-all (OVA) classification of multiclass data with support vector machines (SVMs). We focus specifically on the problem of training…
-
Speech Recognition Engineering Issues in Speech-to-Speech Translation System Design for Low Resource Languages and Domains
This paper, using case studies of creating speech translation systems between English and languages such as Pashto and Farsi, describes some of the practical issues and the solutions that were…
-
Compositionality for Tightly Coupled Systems: a New Application of the Propositions-As-Types Interpretation
Although compositional techniques are being successfully employed in practice, the use of such techniques is often rather informal and intuitive, and typically a justification for correct behaviour of the composed…
-
Conflict Negotiation Among Personal Calendar Agents
We will demonstrate distributed conflict resolution in the context of personalized meeting scheduling. The demonstration will show how distributed constraint optimization can be used to facilitate interaction between cognitive agents…