Institution
International Institute of Information Technology, Hyderabad
Education•Hyderabad, India•
About: International Institute of Information Technology, Hyderabad is a education organization based out in Hyderabad, India. It is known for research contribution in the topics: Computer science & Authentication. The organization has 2048 authors who have published 3677 publications receiving 45319 citations. The organization is also known as: IIIT Hyderabad & International Institute of Information Technology (IIIT).
Topics: Computer science, Authentication, Deep learning, Artificial neural network, Internet security
Papers published on a yearly basis
Papers
More filters
••
26 Mar 2014
TL;DR: This work presents methods to classify sequences of fixations and keystrokes into activities and model translation sessions with the objective to recognize translator expertise and shows significant error reductions in the task of recognizing certified translators and their years of experience.
Abstract: Professional human translation is necessary to meet high quality standards in industry and governmental agencies Translators engage in multiple activities during their task, and there is a need to model their behavior, with the objective to understand and optimize the translation process In recent years, user interfaces enabled us to record user events such as eye-movements or keystrokes Although there have been insightful descriptive analysis of the translation process, there are multiple advantages in enabling quantitative inference We present methods to classify sequences of fixations and keystrokes into activities and model translation sessions with the objective to recognize translator expertise We show significant error reductions in the task of recognizing certified translators and their years of experience, and analyze the characterizing patterns
14 citations
••
TL;DR: In this article, the authors study the security of a semi-device-independent QKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code.
Abstract: While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
14 citations
••
University of Liverpool1, Kobe University2, Hebrew University of Jerusalem3, Universidad del Valle de Guatemala4, University of Iowa5, Tel Aviv University6, University of Colorado Boulder7, International Institute of Information Technology, Hyderabad8, Indian Institute of Technology Delhi9, University of Stirling10, University of Calgary11, University of Kansas12
TL;DR: A computational model is presented which successfully simulates this pattern of results in a single discriminative-learning mechanism, achieving by-verb correlations of around r = 0.75 with human judgment data.
14 citations
••
25 Nov 2007TL;DR: This work proposes a multi-level composition model that allows for the specification of a number of transactional properties, like atomicity and commitment, for activities at all levels of the composition, and helps to coordinate payments and eventual closure of the contract.
Abstract: An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system A contract is a legal agreement involving parties, activities, clauses and payments The goals of an e-contract include precise specification of the activities of the contract, mapping them into deployable workflows, and providing transactional support in their execution Activities in a contract are complex and interdependent They may be executed by different parties autonomously and in a loosely coupled fashion They may be compensated and/or re-executed at different times relative to the execution of other activities Both the initial specification of the activities and the later verification of their executions with respect to compliance to the clauses are tedious and complicated We believe that an e-contract should reflect both the specification and the execution aspects of the activities at the same time, where the former is about the composition logic and the later about the transactional properties Towards facilitating this, we propose a multi-level composition model for activities in e-contracts Our model allows for the specification of a number of transactional properties, like atomicity and commitment, for activities at all levels of the composition In addition to their novelty, the transactional properties help to coordinate payments and eventual closure of the contract
14 citations
••
12 Mar 2015
TL;DR: Gaussian mixture modeling with a universal background model (GMM-UBM) is used for developing a emotion recognition system and 4 emotions are considered, including Anger, Fear, Happy and Neutral.
Abstract: In recent past a lot of scientific attention is paid on recognizing the emotional state of the speaker from his speech. Emotion recognition is a challenging task as human emotions are complex, subtle and emotive state in human speech does not persist long. So it is important to study the presence of emotion identifiable information in smaller segments of speech. This study is aimed at studying the presence of emotional specific information with relevance to the position of the word in the utterance. During the present study, spectral features are employed to represent emotion specific information in speech. Spectral features from smaller speech segments of speech based on their position in the utterance are employed to study the presence of emotion in speech. Due to the lack of adequate data in small speech segments to support conventional GMM during the course of present study Gaussian mixture modeling with a universal background model (GMM-UBM) is used for developing a emotion recognition system. Speech data from IITKGP-SESC is used during the course of the present study. During the present study 4 (Anger, Fear, Happy and Neutral) emotions are considered.
14 citations
Authors
Showing all 2066 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ravi Shankar | 66 | 672 | 19326 |
Joakim Nivre | 61 | 295 | 17203 |
Aravind K. Joshi | 59 | 249 | 16417 |
Ashok Kumar Das | 56 | 278 | 9166 |
Malcolm F. White | 55 | 172 | 10762 |
B. Yegnanarayana | 54 | 340 | 12861 |
Ram Bilas Pachori | 48 | 182 | 8140 |
C. V. Jawahar | 45 | 479 | 9582 |
Saurabh Garg | 40 | 206 | 6738 |
Himanshu Thapliyal | 36 | 201 | 3992 |
Monika Sharma | 36 | 238 | 4412 |
Ponnurangam Kumaraguru | 33 | 269 | 6849 |
Abhijit Mitra | 33 | 240 | 7795 |
Ramanathan Sowdhamini | 33 | 256 | 4458 |
Helmut Schiessel | 32 | 117 | 3527 |