scispace - formally typeset
Search or ask a question
Institution

International Institute of Information Technology, Hyderabad

EducationHyderabad, India
About: International Institute of Information Technology, Hyderabad is a education organization based out in Hyderabad, India. It is known for research contribution in the topics: Computer science & Authentication. The organization has 2048 authors who have published 3677 publications receiving 45319 citations. The organization is also known as: IIIT Hyderabad & International Institute of Information Technology (IIIT).


Papers
More filters
Proceedings ArticleDOI
26 Mar 2014
TL;DR: This work presents methods to classify sequences of fixations and keystrokes into activities and model translation sessions with the objective to recognize translator expertise and shows significant error reductions in the task of recognizing certified translators and their years of experience.
Abstract: Professional human translation is necessary to meet high quality standards in industry and governmental agencies Translators engage in multiple activities during their task, and there is a need to model their behavior, with the objective to understand and optimize the translation process In recent years, user interfaces enabled us to record user events such as eye-movements or keystrokes Although there have been insightful descriptive analysis of the translation process, there are multiple advantages in enabling quantitative inference We present methods to classify sequences of fixations and keystrokes into activities and model translation sessions with the objective to recognize translator expertise We show significant error reductions in the task of recognizing certified translators and their years of experience, and analyze the characterizing patterns

14 citations

Journal ArticleDOI
TL;DR: In this article, the authors study the security of a semi-device-independent QKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code.
Abstract: While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

14 citations

Book ChapterDOI
25 Nov 2007
TL;DR: This work proposes a multi-level composition model that allows for the specification of a number of transactional properties, like atomicity and commitment, for activities at all levels of the composition, and helps to coordinate payments and eventual closure of the contract.
Abstract: An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system A contract is a legal agreement involving parties, activities, clauses and payments The goals of an e-contract include precise specification of the activities of the contract, mapping them into deployable workflows, and providing transactional support in their execution Activities in a contract are complex and interdependent They may be executed by different parties autonomously and in a loosely coupled fashion They may be compensated and/or re-executed at different times relative to the execution of other activities Both the initial specification of the activities and the later verification of their executions with respect to compliance to the clauses are tedious and complicated We believe that an e-contract should reflect both the specification and the execution aspects of the activities at the same time, where the former is about the composition logic and the later about the transactional properties Towards facilitating this, we propose a multi-level composition model for activities in e-contracts Our model allows for the specification of a number of transactional properties, like atomicity and commitment, for activities at all levels of the composition In addition to their novelty, the transactional properties help to coordinate payments and eventual closure of the contract

14 citations

Proceedings ArticleDOI
12 Mar 2015
TL;DR: Gaussian mixture modeling with a universal background model (GMM-UBM) is used for developing a emotion recognition system and 4 emotions are considered, including Anger, Fear, Happy and Neutral.
Abstract: In recent past a lot of scientific attention is paid on recognizing the emotional state of the speaker from his speech. Emotion recognition is a challenging task as human emotions are complex, subtle and emotive state in human speech does not persist long. So it is important to study the presence of emotion identifiable information in smaller segments of speech. This study is aimed at studying the presence of emotional specific information with relevance to the position of the word in the utterance. During the present study, spectral features are employed to represent emotion specific information in speech. Spectral features from smaller speech segments of speech based on their position in the utterance are employed to study the presence of emotion in speech. Due to the lack of adequate data in small speech segments to support conventional GMM during the course of present study Gaussian mixture modeling with a universal background model (GMM-UBM) is used for developing a emotion recognition system. Speech data from IITKGP-SESC is used during the course of the present study. During the present study 4 (Anger, Fear, Happy and Neutral) emotions are considered.

14 citations


Authors

Showing all 2066 results

NameH-indexPapersCitations
Ravi Shankar6667219326
Joakim Nivre6129517203
Aravind K. Joshi5924916417
Ashok Kumar Das562789166
Malcolm F. White5517210762
B. Yegnanarayana5434012861
Ram Bilas Pachori481828140
C. V. Jawahar454799582
Saurabh Garg402066738
Himanshu Thapliyal362013992
Monika Sharma362384412
Ponnurangam Kumaraguru332696849
Abhijit Mitra332407795
Ramanathan Sowdhamini332564458
Helmut Schiessel321173527
Network Information
Related Institutions (5)
Microsoft
86.9K papers, 4.1M citations

90% related

Facebook
10.9K papers, 570.1K citations

89% related

Google
39.8K papers, 2.1M citations

89% related

Carnegie Mellon University
104.3K papers, 5.9M citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202310
202229
2021373
2020440
2019367
2018364