Sciweavers

5246 search results - page 107 / 1050
» Sanitization models and their limitations
Sort
View
87
Voted
IJNSEC
2008
147views more  IJNSEC 2008»
14 years 11 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
JMLR
2010
135views more  JMLR 2010»
14 years 6 months ago
Structured Prediction Cascades
Structured prediction tasks pose a fundamental trade-off between the need for model complexity to increase predictive power and the limited computational resources for inference i...
David Weiss, Benjamin Taskar
ICPR
2002
IEEE
15 years 4 months ago
Image Segmentation Using Gradient Vector Diffusion and Region Merging
Active Contour (or Snake) Model is recognized as one of the efficient tools for 2D/3D image segmentation. However, traditional snake models prove to be limited in several aspects...
Zeyun Yu, Chandrajit L. Bajaj
ALT
2006
Springer
15 years 3 months ago
Learning and Extending Sublanguages
A number of natural models for learning in the limit is introduced to deal with the situation when a learner is required to provide a grammar covering the input even if only a par...
Sanjay Jain, Efim B. Kinber
UAI
1989
15 years 18 days ago
Can Uncertainty Management be Realized in a Finite Totally Ordered Probability Algebra?
In this paper, the feasibility of using finite totally ordered probability models under Aleliunas’s Theory of Probabilistic Logic [Aleliunas, 1988] is investigated. The general...
Yang Xiang, Michael P. Beddoes, David Poole