Sciweavers

6906 search results - page 87 / 1382
» An algorithm for modelling key terms
Sort
View
CCS
2005
ACM
15 years 9 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
IRI
2008
IEEE
15 years 10 months ago
An algorithm for activation timed influence nets
Activation Timed Influence Net (ATIN) is a term representing a progressively evolving sequence of actions, where the effects of an action become the preconditions of the action th...
Panayota Papantoni-Kazakos, Abbas K. Zaidi, M. Far...
ICCV
2007
IEEE
16 years 6 months ago
A Globally Optimal Algorithm for Robust TV-L1 Range Image Integration
Robust integration of range images is an important task for building high-quality 3D models. Since range images, and in particular range maps from stereo vision, may have a substa...
Christopher Zach, Thomas Pock, Horst Bischof
138
Voted
ACL
2003
15 years 5 months ago
Accurate Unlexicalized Parsing
We demonstrate that an unlexicalized PCFG can parse much more accurately than previously shown, by making use of simple, linguistically motivated state splits, which break down fa...
Dan Klein, Christopher D. Manning
IPM
2006
64views more  IPM 2006»
15 years 4 months ago
Text mining without document context
We consider a challenging clustering task: the clustering of muti-word terms without document co-occurrence information in order to form coherent groups of topics. For this task, ...
Eric SanJuan, Fidelia Ibekwe-Sanjuan