Sciweavers

2027 search results - page 255 / 406
» When is it best to best-respond
Sort
View
EMNLP
2006
15 years 2 months ago
Unsupervised Discovery of a Statistical Verb Lexicon
This paper demonstrates how unsupervised techniques can be used to learn models of deep linguistic structure. Determining the semantic roles of a verb's dependents is an impo...
Trond Grenager, Christopher D. Manning
CARS
2001
15 years 2 months ago
Rendering and interaction in co-operative 3-D image analysis
Most interactive segmentation methods are defined at a 2-d level requiring sometimes extensive interaction when the object of interest is difficult to be outlined by simple means ...
Klaus D. Tönnies, Manfred Hinz, Regina Pohle
ICISC
2004
146views Cryptology» more  ICISC 2004»
15 years 2 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
ICISC
2004
96views Cryptology» more  ICISC 2004»
15 years 2 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
IJIT
2004
15 years 2 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed