Sciweavers

114 search results - page 4 / 23
» Computing First And Follow Functions For Feature-Theoretic G...
Sort
View
CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
15 years 1 months ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
TSP
2008
178views more  TSP 2008»
14 years 9 months ago
Digital Computation of Linear Canonical Transforms
Abstract--We deal with the problem of efficient and accurate digital computation of the samples of the linear canonical transform (LCT) of a function, from the samples of the origi...
A. Koc, Haldun M. Özaktas, Cagatay Candan, M....
ICPR
2004
IEEE
15 years 10 months ago
Neural Network-Based Proper Names Extraction in Fax Images
In this paper, we are interested in the sender's name extraction in fax cover pages through a machine learning scheme. For this purpose, two analysis methods are implemented ...
Laurence Likforman-Sulem, Noura Azzabou
LREC
2008
84views Education» more  LREC 2008»
14 years 11 months ago
A Hybrid Approach to Extracting and Classifying Verb+Noun Constructions
We present the main findings and preliminary results of an ongoing project aimed at developing a system for collocation extraction based on contextual morpho-syntactic properties....
Amalia Todirascu, Dan Tufis, Ulrich Heid, Christop...
ESOP
2012
Springer
13 years 5 months ago
The Call-by-Need Lambda Calculus, Revisited
The existing call-by-need λ calculi describe lazy evaluation via equational logics. A programmer can use these logics to safely ascertain whether one term is behaviorally equivale...
Stephen Chang, Matthias Felleisen