Sciweavers

104 search results - page 5 / 21
» Auxiliary Deep Generative Models
Sort
View
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
14 years 4 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu
VLDB
1992
ACM
111views Database» more  VLDB 1992»
14 years 2 months ago
Using Segmented Right-Deep Trees for the Execution of Pipelined Hash Joins
In this paper, we explore the execution of pipelined hash joins in a multiprocessor-based database system. To improve the query execution, an innovative approach on query executio...
Ming-Syan Chen, Ming-Ling Lo, Philip S. Yu, Honest...
EMNLP
2008
14 years 9 days ago
Seed and Grow: Augmenting Statistically Generated Summary Sentences using Schematic Word Patterns
We examine the problem of content selection in statistical novel sentence generation. Our approach models the processes performed by professional editors when incorporating materi...
Stephen Wan, Robert Dale, Mark Dras, Cécile...
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
12 years 1 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
14 years 5 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin