Sciweavers

1099 search results - page 150 / 220
» String Transformation Learning
Sort
View
EUROCRYPT
2007
Springer
14 years 2 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
ANLP
2000
140views more  ANLP 2000»
14 years 3 days ago
Sentence Reduction for Automatic Text Summarization
We present a novel sentence reduction system for automatically removing extraneous phrases from sentences that are extracted from a document for summarization purpose. The system ...
Hongyan Jing
IROS
2007
IEEE
164views Robotics» more  IROS 2007»
14 years 5 months ago
Emulation and behavior understanding through shared values
— Neurophysiology has revealed the existence of mirror neurons in brain of macaque monkeys and they shows similar activities during executing an observation of goal directed move...
Yasutake Takahashi, Teruyasu Kawamata, Minoru Asad...
ICDM
2005
IEEE
118views Data Mining» more  ICDM 2005»
14 years 4 months ago
A Heterogeneous Field Matching Method for Record Linkage
Record linkage is the process of determining that two records refer to the same entity. A key subprocess is evaluating how well the individual fields, or attributes, of the recor...
Steven Minton, Claude Nanjo, Craig A. Knoblock, Ma...
CVPR
2010
IEEE
14 years 4 months ago
Anatomical Parts-Based Regression Using Non-Negative Matrix Factorization
Non-negative matrix factorization (NMF) is an excellent tool for unsupervised parts-based learning, but proves to be ineffective when parts of a whole follow a specific pattern. ...
Swapna Joshi, Karthikeyan Shanmugavadivel, B.S. Ma...