Sciweavers

101 search results - page 20 / 21
» Investigations on Word Senses and Word Usages
Sort
View
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 5 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
SIAMCOMP
1998
118views more  SIAMCOMP 1998»
13 years 4 months ago
Genericity, Randomness, and Polynomial-Time Approximations
Polynomial-time safe and unsafe approximations for intractable sets were introduced by Meyer and Paterson [Technical Report TM-126, Laboratory for Computer Science, MIT, Cambridge,...
Yongge Wang
SSS
2007
Springer
100views Control Systems» more  SSS 2007»
13 years 11 months ago
Stability of the Multiple-Access Channel Under Maximum Broadcast Loads
We investigate deterministic broadcasting on multiple-access channels in the framework of adversarial queuing. A protocol is stable when the number of packets stays bounded, and it...
Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A....
ICCSA
2003
Springer
13 years 10 months ago
Information Extraction to Generate Visual Simulations of Car Accidents from Written Descriptions
This paper describes a system to create animated 3D scenes of car accidents from written reports. The text-to-scene conversion process consists of two stages. An information extrac...
Pierre Nugues, Sylvain Dupuy, Arjan Egges
IPMU
2010
Springer
13 years 9 months ago
Independent Natural Extension
We introduce a general definition for the independence of a number of finite-valued variables, based on coherent lower previsions. Our definition has an epistemic flavour: it a...
Gert de Cooman, Enrique Miranda, Marco Zaffalon