منابع مشابه
Aggregation in Natural Language Generation: Another Look
Aggregation is gaining attention as an important phenomenon in automated natural language generation. The small quantity of previous work which deals with this subject suuers from some conceptual diiculties, including inadequate deenition (i.e., as a process which eliminates redundancy), vagueness as to its locus in the generation process, and unclear relation to other phenomena. It is conclude...
متن کاملAnother Look at the Describing Equations of Dynamics
We look at the fundamental equations of analytical dynamics from a different perspective. We discuss an additional way of evaluating the approaches for deriving the equations of motion, and we show that all of the fundamental equations can be viewed as projections of the force and moment balances onto directions affected by the velocity variables. We re-classify the existing approaches into two...
متن کاملPentaquark masses: another look
We refine theoretical estimates of the masses of the Θ and other pentaquark states. For the Karliner-Lipkin model, it is noted that for the qqq̄ triquark, proper incorporation of the colour-spin SU(6) symmetry has not been made in the literature. We address this lacuna, make a small generalization in the hyperfine interaction couplings used hitherto, and incorprate flavour symmetry breaking. Aft...
متن کاملAnother look at HMQV
The HMQV protocols are ‘hashed variants’ of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under reasonable assumptions in the (extended) Canetti-Krawczyk model for key exchange; and (ii) superior performance in some situations. In this paper w...
متن کاملAnother Look at Tightness
We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2004
ISSN: 1556-5068
DOI: 10.2139/ssrn.588743