Sciweavers

5153 search results - page 382 / 1031
» Introduction to Randomized Algorithms
Sort
View
TDHMS
2008
15 years 3 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
INLG
2010
Springer
15 years 2 months ago
Poly-co: An Unsupervised Co-reference Detection System
We describe our contribution to the Generation Challenge 2010 for the tasks of Named Entity Recognition and coreference detection (GREC-NER). To extract the NE and the referring e...
Eric Charton, Michel Gagnon, Benoît Ozell
PROPERTYTESTING
2010
15 years 2 months ago
On Constant Time Approximation of Parameters of Bounded Degree Graphs
How well can the maximum size of an independent set, or the minimum size of a dominating set of a graph in which all degrees are at most d be approximated by a randomized constant...
Noga Alon
ICDAR
2009
IEEE
15 years 2 months ago
Document Image Binarisation Using Markov Field Model
This paper presents a new approach for the binarization of seriously degraded manuscript. We introduce a new technique based on a Markov Random Field (MRF) model of the document. ...
Thibault Lelore, Frédéric Bouchara
ICASSP
2011
IEEE
14 years 8 months ago
A stochastic compartmental approach to modeling and simulation of cancer spheroid formation and evolution
In this paper we model and simulate a biological system describing the evolution of cancer stem cells into tumors. Starting from some basic hypotheses about the behavior of these ...
Mónica F. Bugallo, Shishir Dash, Galina Bot...