نتایج جستجو برای: id

تعداد نتایج: 28342  

1984
Leonard Pitt

Inductive Inference Machines (IIMs) attempt to identify functions given only input-output pairs of the functions. Pro6a6ilistic IIMs are defined, as is the probability that a probabilistic IIM identifies a function with respect to two common identification criteria: EX and BC. Let ID denote either of these criteria. Then IDpm&) is the family of sets of functions U for which there is a probabili...

2014
Daniel K. Feinberg Norma Rodriguez Sidra Hussain

Existing literature demonstrates that infants can discriminate between categories of infantdirected (ID) speech based on the speaker’s intended message – that is, infants recognize the difference between comforting and approving ID speech, and treat different utterances from within these two categories similarly. Furthermore, the literature also demonstrates that infants understand many aspects...

Journal: :J. London Math. Society 2011
Valentina Casarino Marco M. Peloso

In this paper we study the L-convergence of the Riesz means S R(f) for the sublaplacian on the sphere S in the complex n-dimensional space C. We show that S R(f) converges to f in L (S) when δ > δ(p) := (2n− 1)| 2 − 1 p |. The index δ(p) improves the one found by Alexopoulos and Lohoué [AL], 2n| 1 2 − 1 p |, and it coincides with the one found by Mauceri [Ma] and, with different methods, by Mül...

Journal: :Pattern Recognition 2010
Md. Altab Hossain Yasushi Makihara Junqiu Wang Yasushi Yagi

Variations in clothing alter an individual’s appearance, making the problem of gait identification much more difficult. If the type of clothing differs between the gallery and a probe, certain parts of the silhouettes are likely to change and the ability to discriminate subjects decreases with respect to these parts. A part-based approach, therefore, has the potential of selecting the appropria...

Journal: :Comput. J. 2012
Hung-Yu Chien

In 2010, Fan et al. proposed an efficient anonymous multi-receiver identity-based encryption scheme. This scheme allows a sender to send an encrypted message to a set of designated receivers while preserving receiver anonymity. The scheme is highly efficient for each receiver as it requires only two pairing operations. However, we found that the scheme failed to protect receiver anonymity and t...

2014
Martin J. Pickering Simon Garrod

In the psychology of language, most accounts of self-monitoring assume that it is based on comprehension. Here we outline and develop the alternative account proposed by Pickering and Garrod (2013), in which speakers construct forward models of their upcoming utterances and compare them with the utterance as they produce them. We propose that speakers compute inverse models derived from the dis...

1989
Deborah Gnzburger Marianne de Vries

Speakers' sex identification scores were elicited in order to test the possible perceptual function of minor differentiating cues. The variable cues under investlgation, FO range and F3 location, were manipulated and presented to listeners in a pairwise comparison task. Minor F3 location variation yielded results in the expected direction, whereas FO range proved to be too small to be perceptua...

2017
Nico Döttling Sanjam Garg

Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constructions of fully secure IBE and selectively secure hierarchical IBE (HIBE) schemes. Our HIBE scheme allows for delegation arbitrarily many times.

Journal: :Inf. Sec. Techn. Report 2007
Richard Clayton

Calling Line Identification (CLI) tells the recipient of a telephone call the number at the other end of the line. However, various insecurities mean that even on traditional telephone systems, CLI cannot be entirely relied upon to be accurate. Once Voice-overIP (VoIP) enters the picture, CLI validity effectively depends upon the integrity of Internet traceability, and must therefore be treated...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید