Sciweavers

516 search results - page 65 / 104
» Sets of k-Independent Strings
Sort
View
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
13 years 10 months ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
EMNLP
2008
13 years 10 months ago
Generalizing Local and Non-Local Word-Reordering Patterns for Syntax-Based Machine Translation
Syntactic word reordering is essential for translations across different grammar structures between syntactically distant languagepairs. In this paper, we propose to embed local a...
Bing Zhao, Yaser Al-Onaizan
LREC
2008
93views Education» more  LREC 2008»
13 years 10 months ago
Targeting Chinese Nominal Compounds in Corpora
For compounding languages, a great part of the topical semantics is conveyed via nominal compounds. Various applications of natural language processing can profit from explicit ac...
Weiruo Qu, Christoph Ringlstetter, Randy Goebel
FCS
2006
13 years 10 months ago
The Representational Power of Conjunctive Normal Form
- There is continuing research interest in comparison of the complexity of problems within the class NP-Complete. This paper examines the representational power of conjunctive norm...
Thomas O'Neil, Jason Smith
CLIN
2001
13 years 10 months ago
Corpus-based Acquisition of Collocational Prepositional Phrases
Collocational prepositional phrases like ten koste van (at the expense of), met het oog op (with an eye on), and onder het mom van (under the pretext of) are patterns of the form ...
Gosse Bouma, Begoña Villada