Sciweavers

700 search results - page 46 / 140
» words 2005
Sort
View
ISPEC
2005
Springer
15 years 3 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
77
Voted
LREC
2010
217views Education» more  LREC 2010»
14 years 11 months ago
Building a Web Corpus of Czech
Large corpora are essential to modern methods of computational linguistics and natural language processing. In this paper, we describe an ongoing project whose aim is to build a l...
Drahomíra "johanka" Spoustová, Miros...
72
Voted
KDD
2005
ACM
185views Data Mining» more  KDD 2005»
15 years 10 months ago
Mining comparable bilingual text corpora for cross-language information integration
Integrating information in multiple natural languages is a challenging task that often requires manually created linguistic resources such as a bilingual dictionary or examples of...
Tao Tao, ChengXiang Zhai
ECSQARU
2005
Springer
15 years 3 months ago
Conciliation and Consensus in Iterated Belief Merging
Two conciliation processes for intelligent agents based on an iterated mergethen-revise change function for belief profiles are introduced and studied. The first approach is ske...
Olivier Gauwin, Sébastien Konieczny, Pierre...
ATVA
2005
Springer
109views Hardware» more  ATVA 2005»
15 years 3 months ago
A New Reachability Algorithm for Symmetric Multi-processor Architecture
Partitioned BDD-based algorithms have been proposed in the literature to solve the memory explosion problem in BDD-based verification. A naive parallelization of such algorithms ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...