Sciweavers

524 search results - page 32 / 105
» ets 2010
Sort
View
INDOCRYPT
2010
Springer
13 years 5 months ago
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of th...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
NAACL
2010
13 years 5 months ago
The Effect of Ambiguity on the Automated Acquisition of WSD Examples
Several methods for automatically generating labeled examples that can be used as training data for WSD systems have been proposed, including a semisupervised approach based on re...
Mark Stevenson, Yikun Guo
CAI
2010
Springer
13 years 5 months ago
Constrained Longest Common Subsequence Computing Algorithms in Practice
The problem of finding a constrained longest common subsequence (CLCS) for the sequences A and B with respect to the sequence P was introduced recently. Its goal is to find a longe...
Sebastian Deorowicz, J. Obstoj
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
LREC
2010
213views Education» more  LREC 2010»
13 years 9 months ago
Extensive Evaluation of a FrameNet-WordNet mapping resource
Lexical resources are basic components of many text processing system devoted to information extraction, question answering or dialogue. In paste years many resources have been de...
Diego De Cao, Danilo Croce, Roberto Basili