Sciweavers

892 search results - page 124 / 179
» et 2007
Sort
View
JMLR
2011
105views more  JMLR 2011»
13 years 3 months ago
Posterior Sparsity in Unsupervised Dependency Parsing
A strong inductive bias is essential in unsupervised grammar induction. In this paper, we explore a particular sparsity bias in dependency grammars that encourages a small number ...
Jennifer Gillenwater, Kuzman Ganchev, João ...
TSD
2007
Springer
14 years 2 months ago
The Intonational Realization of Requests in Polish Task-Oriented Dialogues
available in the Conference Program). 2007: (with E. Jarmołowicz, Z. Malisz i M. Szczyszek) Gesture, Prosody and Lexicon in ented Dialogues: Progress Report. (Poznań Linguistic M...
Maciej Karpinski
LATIN
2010
Springer
14 years 3 months ago
Layered Working-Set Trees
The working-set bound [Sleator and Tarjan, J. ACM, 1985] roughly states that searching for an element is fast if the element was accessed recently. Binary search trees, such as sp...
Prosenjit Bose, Karim Douïeb, Vida Dujmovic, ...
NSPW
2003
ACM
14 years 2 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 3 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert