Sciweavers

3227 search results - page 630 / 646
» Designing with Distance Fields
Sort
View
ICISC
2000
126views Cryptology» more  ICISC 2000»
13 years 9 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
WSC
2000
13 years 9 months ago
An integrated object model for activity network based simulation
This paper describes an object-orientated simulation approach towards an integrated planning of production systems. The main obstacle for an integrated use of simulation over diff...
Gert Zülch, Jörg Fischer, Uwe Jonsson
ANLP
1994
108views more  ANLP 1994»
13 years 9 months ago
Does Baum-Welch Re-estimation Help Taggers?
In part of speech tagging by Hidden Markov Model, a statistical model is used to assign grammatical categories to words in a text. Early work in the field relied on a corpus which...
David Elworthy
EACL
1993
ACL Anthology
13 years 9 months ago
An Endogeneous Corpus-Based Method for Structural Noun Phrase Disambiguation
In this paper, we describe a method for structural noun phrase disambiguation which mainly relies on the examination of the text corpus under analysis and doesn't need to int...
Didier Bourigault
APCCM
2009
13 years 8 months ago
A Semantic Associative Computation Method for Automatic Decorative-Multimedia Creation with 'Kansei' Information
In the design of multimedia systems, one of the important issues is how to deal with "Kansei" of human beings. The concept of "Kansei" in Japanese includes sev...
Yasushi Kiyoki, Xing Chen