Sciweavers

6833 search results - page 180 / 1367
» Some two-character sets
Sort
View
139
Voted
IACR
2011
89views more  IACR 2011»
14 years 4 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
ICCAD
2001
IEEE
84views Hardware» more  ICCAD 2001»
16 years 1 months ago
On Identifying Don't Care Inputs of Test Patterns for Combinational Circuits
Given a test set for stuck-at faults, some of primary input values may be changed to opposite logic values without losing fault coverage. We can regard such input values as don’...
Seiji Kajihara, Kohei Miyase
METRICS
2005
IEEE
15 years 10 months ago
On Refactoring Support Based on Code Clone Dependency Relation
Generally, code clones are regarded as one of the factors that make software maintenance more difficult. A code clone is a set of source code fragments identical or similar to ea...
Norihiro Yoshida, Yoshiki Higo, Toshihiro Kamiya, ...
EMNLP
2008
15 years 6 months ago
A comparison of Bayesian estimators for unsupervised Hidden Markov Model POS taggers
There is growing interest in applying Bayesian techniques to NLP problems. There are a number of different estimators for Bayesian models, and it is useful to know what kinds of t...
Jianfeng Gao, Mark Johnson
IDA
2006
Springer
15 years 4 months ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...