Sciweavers

2851 search results - page 532 / 571
» Operationalizing Conceptual Models Based on a Model of Depen...
Sort
View
EACL
2003
ACL Anthology
15 years 5 months ago
Topological Parsing
We present a new grammar formalism for parsing with freer word-order languages, motivated by recent linguistic research in German and the Slavic languages. Unlike CFGs, these gram...
Gerald Penn, Mohammad Haji-Abdolhosseini
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 4 months ago
Settling the Polynomial Learnability of Mixtures of Gaussians
Given data drawn from a mixture of multivariate Gaussians, a basic problem is to accurately estimate the mixture parameters. We give an algorithm for this problem that has running ...
Ankur Moitra, Gregory Valiant
CGF
2005
311views more  CGF 2005»
15 years 4 months ago
Cubical Marching Squares: Adaptive Feature Preserving Surface Extraction from Volume Data
In this paper, we present a new method for surface extraction from volume data which preserves sharp features, maintains consistent topology and generates surface adaptively witho...
Chien-Chang Ho, Fu-Che Wu, Bing-Yu Chen, Yung-Yu C...
COMCOM
2004
112views more  COMCOM 2004»
15 years 4 months ago
Design and analysis of optimal adaptive de-jitter buffers
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design...
Gagan L. Choudhury, Robert G. Cole
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 2 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...