Sciweavers

6833 search results - page 1307 / 1367
» Some two-character sets
Sort
View
ICISC
2000
126views Cryptology» more  ICISC 2000»
14 years 11 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
ACL
1997
14 years 11 months ago
Approximating Context-Free Grammars with a Finite-State Calculus
Although adequate models of human language for syntactic analysis and semantic interpretation are of at least contextfree complexity, for applications such as speech processing in...
Edmund Grimley-Evans
NIPS
2000
14 years 11 months ago
Learning Continuous Distributions: Simulations With Field Theoretic Priors
Learning of a smooth but nonparametric probability density can be regularized using methods of Quantum Field Theory. We implement a field theoretic prior numerically, test its eff...
Ilya Nemenman, William Bialek
WSC
1998
14 years 11 months ago
Getting Started in Simulation in Healthcare
To begin using simulation in healthcare, one must first recognize the types of problems or decisions that can best be analyzed using simulation. Once a problem has been identified...
Julie C. Lowery
UAI
2000
14 years 11 months ago
Variational Relevance Vector Machines
The Support Vector Machine (SVM) of Vapnik [9] has become widely established as one of the leading approaches to pattern recognition and machine learning. It expresses predictions...
Christopher M. Bishop, Michael E. Tipping
« Prev « First page 1307 / 1367 Last » Next »