نتایج جستجو برای: id
تعداد نتایج: 28342 فیلتر نتایج به سال:
Inductive Inference Machines (IIMs) attempt to identify functions given only input-output pairs of the functions. Pro6a6ilistic IIMs are defined, as is the probability that a probabilistic IIM identifies a function with respect to two common identification criteria: EX and BC. Let ID denote either of these criteria. Then IDpm&) is the family of sets of functions U for which there is a probabili...
Existing literature demonstrates that infants can discriminate between categories of infantdirected (ID) speech based on the speaker’s intended message – that is, infants recognize the difference between comforting and approving ID speech, and treat different utterances from within these two categories similarly. Furthermore, the literature also demonstrates that infants understand many aspects...
In this paper we study the L-convergence of the Riesz means S R(f) for the sublaplacian on the sphere S in the complex n-dimensional space C. We show that S R(f) converges to f in L (S) when δ > δ(p) := (2n− 1)| 2 − 1 p |. The index δ(p) improves the one found by Alexopoulos and Lohoué [AL], 2n| 1 2 − 1 p |, and it coincides with the one found by Mauceri [Ma] and, with different methods, by Mül...
Variations in clothing alter an individual’s appearance, making the problem of gait identification much more difficult. If the type of clothing differs between the gallery and a probe, certain parts of the silhouettes are likely to change and the ability to discriminate subjects decreases with respect to these parts. A part-based approach, therefore, has the potential of selecting the appropria...
In 2010, Fan et al. proposed an efficient anonymous multi-receiver identity-based encryption scheme. This scheme allows a sender to send an encrypted message to a set of designated receivers while preserving receiver anonymity. The scheme is highly efficient for each receiver as it requires only two pairing operations. However, we found that the scheme failed to protect receiver anonymity and t...
In the psychology of language, most accounts of self-monitoring assume that it is based on comprehension. Here we outline and develop the alternative account proposed by Pickering and Garrod (2013), in which speakers construct forward models of their upcoming utterances and compare them with the utterance as they produce them. We propose that speakers compute inverse models derived from the dis...
Speakers' sex identification scores were elicited in order to test the possible perceptual function of minor differentiating cues. The variable cues under investlgation, FO range and F3 location, were manipulated and presented to listeners in a pairwise comparison task. Minor F3 location variation yielded results in the expected direction, whereas FO range proved to be too small to be perceptua...
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme allows for delegation arbitrarily many times.
Calling Line Identification (CLI) tells the recipient of a telephone call the number at the other end of the line. However, various insecurities mean that even on traditional telephone systems, CLI cannot be entirely relied upon to be accurate. Once Voice-overIP (VoIP) enters the picture, CLI validity effectively depends upon the integrity of Internet traceability, and must therefore be treated...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید