Sciweavers

EUROCRYPT
2012
Springer
12 years 1 months ago
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
We present a new approach for creating chosen ciphertext secure encryption. The focal point ork is a new abstraction that we call Detectable Chosen Ciphertext Security (DCCA). Int...
Susan Hohenberger, Allison B. Lewko, Brent Waters
ICDT
2012
ACM
226views Database» more  ICDT 2012»
12 years 1 months ago
Bounded repairability for regular tree languages
We consider the problem of repairing unranked trees (e.g., XML documents) satisfying a given restriction specification R (e.g., a DTD) into unranked trees satisfying a given targ...
Gabriele Puppis, Cristian Riveros, Slawek Staworko
ACL
2012
12 years 1 months ago
A Comparative Study of Target Dependency Structures for Statistical Machine Translation
This paper presents a comparative study of target dependency structures yielded by several state-of-the-art linguistic parsers. Our approach is to measure the impact of these noni...
Xianchao Wu, Katsuhito Sudoh, Kevin Duh, Hajime Ts...
ACL
2012
12 years 1 months ago
Subgroup Detector: A System for Detecting Subgroups in Online Discussions
We present Subgroup Detector, a system for analyzing threaded discussions and identifying the attitude of discussants towards one another and towards the discussion topic. The sys...
Amjad Abu-Jbara, Dragomir R. Radev
ACL
2012
12 years 1 months ago
Exploiting Multiple Treebanks for Parsing with Quasi-synchronous Grammars
We present a simple and effective framework for exploiting multiple monolingual treebanks with different annotation guidelines for parsing. Several types of transformation pattern...
Zhenghua Li, Ting Liu, Wanxiang Che
CVPR
2012
IEEE
12 years 1 months ago
Detection by detections: Non-parametric detector adaptation for a video
We propose an approach to improving the detection results of a generic offline trained detector on a specific video. Our method does not leverage visual tracking as most detecti...
Xiaoyu Wang, Gang Hua, Tony X. Han
PAMI
2012
12 years 1 months ago
Scribble Tracker: A Matting-Based Approach for Robust Tracking
—Model updating is a critical problem in tracking. Inaccurate extraction of the foreground and background information in model adaptation would cause the model to drift and degra...
Jialue Fan, Xiaohui Shen, Ying Wu
JSAC
2011
123views more  JSAC 2011»
13 years 1 months ago
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
—The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems...
Srinivas Shakkottai, R. Srikant, Lei Ying