Sciweavers

2028 search results - page 83 / 406
» Deriving Relation Keys from XML Keys
Sort
View
FOCS
1999
IEEE
15 years 8 months ago
Limits on the Efficiency of One-Way Permutation-Based Hash Functions
Naor and Yung show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build...
Jeong Han Kim, Daniel R. Simon, Prasad Tetali
90
Voted
ICASSP
2010
IEEE
15 years 4 months ago
From flat direct models to segmental CRF models
This paper summarizes recent work at Microsoft on the development of novel direct models. The key characteristic of our approaches is the use of long-span segment level features t...
Geoffrey Zweig, Patrick Nguyen
COGSCI
2010
105views more  COGSCI 2010»
15 years 4 months ago
The Role of Explanation in Discovery and Generalization: Evidence From Category Learning
Research in education and cognitive development suggests that explaining plays a key role in learning and generalization: When learners provide explanations--even to themselves--t...
Joseph J. Williams, Tania Lombrozo
SSWMC
2004
15 years 5 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
98
Voted
CAGD
2000
73views more  CAGD 2000»
15 years 3 months ago
Stability of the B-spline basis via knot insertion
We derive the stability inequality C i cibi for the B-splines bi from the formula for knot insertion. The key observation is that knot removal increases the norm of the B-spline ...
Klaus Höllig