Sciweavers

974 search results - page 144 / 195
» pairing 2010
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 8 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
SIAMDM
2010
128views more  SIAMDM 2010»
13 years 8 months ago
Permutation Capacities of Families of Oriented Infinite Paths
K¨orner and Malvenuto asked whether one can find n n/2 linear orderings (i.e., permutations) of the first n natural numbers such that any pair of them places two consecutive int...
Graham Brightwell, Gérard D. Cohen, Emanuel...
SIGIR
2010
ACM
13 years 8 months ago
Incorporating global information into named entity recognition systems using relational context
The state-of-the-art in Named Entity Recognition relies on a combination of local features of the text and global knowledge to determine the types of the recognized entities. This...
Yuval Merhav, Filipe de Sá Mesquita, Denils...
SMI
2010
IEEE
167views Image Analysis» more  SMI 2010»
13 years 8 months ago
RBF Dipole Surface Evolution
—The level set method can implement a wide variety of shape modeling operations (e.g. offsetting, skeletonization, morphing, blending, smoothing, sharpening, embossing, denoising...
Yuntao Jia, Xinlai Ni, Eric Lorimer, Michael Mulla...
SPEECH
2010
225views more  SPEECH 2010»
13 years 8 months ago
Automatic recognition of regional phonological variation in conversational interaction
One key aspect of face-to-face communication concerns the differences that may exist between speakers’ native regional accents. This paper focuses on the characterization of re...
Vincent Aubanel, Noël Nguyen