Sciweavers

101 search results - page 20 / 21
» Investigations on Word Senses and Word Usages
Sort
View
64
Voted
CORR
2008
Springer
105views Education» more  CORR 2008»
14 years 9 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
SIAMCOMP
1998
118views more  SIAMCOMP 1998»
14 years 9 months ago
Genericity, Randomness, and Polynomial-Time Approximations
Polynomial-time safe and unsafe approximations for intractable sets were introduced by Meyer and Paterson [Technical Report TM-126, Laboratory for Computer Science, MIT, Cambridge,...
Yongge Wang
65
Voted
SSS
2007
Springer
100views Control Systems» more  SSS 2007»
15 years 3 months ago
Stability of the Multiple-Access Channel Under Maximum Broadcast Loads
We investigate deterministic broadcasting on multiple-access channels in the framework of adversarial queuing. A protocol is stable when the number of packets stays bounded, and it...
Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A....
88
Voted
ICCSA
2003
Springer
15 years 2 months ago
Information Extraction to Generate Visual Simulations of Car Accidents from Written Descriptions
This paper describes a system to create animated 3D scenes of car accidents from written reports. The text-to-scene conversion process consists of two stages. An information extrac...
Pierre Nugues, Sylvain Dupuy, Arjan Egges
IPMU
2010
Springer
15 years 2 months ago
Independent Natural Extension
We introduce a general definition for the independence of a number of finite-valued variables, based on coherent lower previsions. Our definition has an epistemic flavour: it a...
Gert de Cooman, Enrique Miranda, Marco Zaffalon