Sciweavers

7918 search results - page 289 / 1584
» Model Composition Directives
Sort
View
ICISC
2009
138views Cryptology» more  ICISC 2009»
15 years 2 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
JMLR
2011
188views more  JMLR 2011»
14 years 11 months ago
Linking Granger Causality and the Pearl Causal Model with Settable Systems
The causal notions embodied in the concept of Granger causality have been argued to belong to a different category than those of Judea Pearl’s Causal Model, and so far their re...
Halbert White, Karim Chalak, Xun Lu
EMNLP
2007
15 years 5 months ago
Structured Prediction Models via the Matrix-Tree Theorem
This paper provides an algorithmic framework for learning statistical models involving directed spanning trees, or equivalently non-projective dependency structures. We show how p...
Terry Koo, Amir Globerson, Xavier Carreras, Michae...
ICPR
2006
IEEE
16 years 5 months ago
Learning Mixtures of Offline and Online features for Handwritten Stroke Recognition
In this paper we propose a novel scheme to combine offline and online features of handwritten strokes. The stateof-the-art methods in handwritten stroke recognition have used a pr...
C. V. Jawahar, Karteek Alahari, Satya Lahari Putre...
WECWIS
2006
IEEE
151views ECommerce» more  WECWIS 2006»
15 years 10 months ago
DAG Synchronization Constraint Language for Business Processes
Correct synchronization among activities is critical in a business process. Current workflow languages such as BPEL specify the control flow of processes explicitly. However, thei...
Qinyi Wu, Akhil Sahai