نتایج جستجو برای: settler extractor

تعداد نتایج: 4330  

2002
Keith Humphreys

A standard feature in cataloging documents is the list of keywords. When the source documents are web pages, we can attempt to aid the cataloger by analyzing the page and presenting relevant support material. Since the keywords that occur in a document generally occur in keyphrases, and keyphrases provide contextual material for reviewing candidate keywords, they are a natural aggregate to extr...

2010
Marina Litvak Mark Last Menahem Friedman Slava Kisilevich

MUltilingual Sentence Extractor (MUSE) is aimed at multilingual single-document summarization. MUSE implements the supervised language-independent summarization approach based on optimization of multiple statistical sentence ranking methods. The MUSE tool consists of two main modules: the training module activated in the offline mode, and the on-line summarization module. The training module ca...

2000
Tsuneo Nitta Masashi Takigawa Takashi Fukuda

This paper describes an attempt to extract multiple peripheral features of a point x(ti,fj) on a timespectrum (TS) pattern by observing n×n neighborhoods of the point, and to incorporate these peripheral features (MPFPs: multiple peripheral feature planes) into the feature extractor of a speech recognition system together with MFCC parameters. Two types of peripheral feature extractor, MPFP-KL ...

Journal: :Des. Codes Cryptography 2008
Reza Rezaeian Farashahi Ruud Pellikaan Andrey Sidorenko

A deterministic extractor for an elliptic curve is a function that converts a random point on the curve to a random-looking bit-string, which is statistically close to a uniformly random bit-string. The problem of converting random points of an elliptic curve into random bits has several cryptographic applications. In this talk, we propose two simple and efficient deterministic extractors for a...

Journal: :IACR Cryptology ePrint Archive 2014
Kenji Yasunaga Kosuke Yuzawa

Fuller et al. (Asiacrypt 2013) studied on computational fuzzy extractors, and showed, as a negative result, that the existence of a computational “secure sketch” implies the existence of an information-theoretically secure sketch with slightly weaker parameters. In this work, we show a similar negative result such that, under some computational assumption, the existence of a computational fuzzy...

Journal: :Security and Communication Networks 2013
Syh-Yuan Tan Zhe Jin Andrew Beng Jin Teoh

Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. M...

Journal: :Brazilian dental journal 2015
Manoel Brito-Júnior João Américo Normanha Carla Cristina Camilo André Luis Faria-e-Silva Paulo César Saquy Maria Ãngela Arêa Leão Ferraz Yara Teresinha Correa Silva-Sousa

This paper describes two cases of instrument fragment removal from the apical thirds of root canals using a customized extractor and a modified needle technique, respectively. In case 1, a customized extractor was manufactured to remove a bur fragment located in the apical root canal of a maxillary central incisor. The use of this extractor enabled successful and conservative removal of the ins...

Journal: :IEEE Data Eng. Bull. 2010
Bin Liu Laura Chiticariu Vivian Chu H. V. Jagadish Frederick Reiss

Developing high-quality information extraction (IE) rules, or extractors, is an iterative and primarily manual process, extremely time consuming, and error prone. In each iteration, the outputs of the extractor are examined, and the erroneous ones are used to drive the refinement of the extractor in the next iteration. Data provenance explains the origins of an output data, and how it has been ...

2015
Sagnik Ray Choudhury C. Lee Giles

Scholarly documents contain multiple figures representing experimental findings. These figures are generated from data which is not reported anywhere else in the paper. We propose a modular architecture for analyzing such figures. Our architecture consists of the following modules: 1. An extractor for figures and associated metadata (figure captions and mentions) from PDF documents; 2. A Search...

2007
Alisson F. Barbieri David L. Carr Richard E. Bilsborrow

Since the 1970s, in-migration has driven a growing human presence and dramatic changes in the physical landscape of the Northern Ecuadorian Amazon frontier, including massive deforestation. Over time, a second phenomenon has emerged with the children of the original migrants often leaving the settler farms of their parents to set out on their own. The vast majority stay in the Amazon region, so...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید