Sciweavers

10602 search results - page 48 / 2121
» Weakly Useful Sequences
Sort
View
JCIT
2010
189views more  JCIT 2010»
13 years 4 months ago
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme
In 2009, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environments. They achieved user anonymity by using secure dynamic IDs...
Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu
JMLR
2010
153views more  JMLR 2010»
13 years 4 months ago
Generalized Expectation Criteria for Semi-Supervised Learning with Weakly Labeled Data
In this paper, we present an overview of generalized expectation criteria (GE), a simple, robust, scalable method for semi-supervised training using weakly-labeled data. GE fits m...
Gideon S. Mann, Andrew McCallum
ACL
2012
11 years 11 months ago
A Graph-based Cross-lingual Projection Approach for Weakly Supervised Relation Extraction
Although researchers have conducted extensive studies on relation extraction in the last decade, supervised approaches are still limited because they require large amounts of trai...
Seokhwan Kim, Gary Geunbae Lee
ICDCS
2008
IEEE
14 years 3 months ago
Weak vs. Self vs. Probabilistic Stabilization
Self-stabilization is a strong property which guarantees that a network always resume a correct behavior starting from an arbitrary initial state. Weaker guarantees have later bee...
Stéphane Devismes, Sébastien Tixeuil...
EUROCRYPT
2007
Springer
14 years 3 months ago
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
We investigate a general class of (black-box) constructions for range extension of weak pseudorandom functions: a construction based on m independent functions F1, . . . , Fm is gi...
Krzysztof Pietrzak, Johan Sjödin