نتایج جستجو برای: adaptive transfer

تعداد نتایج: 485065  

Journal: :CoRR 2013
Son N. Tran Artur S. d'Avila Garcez

Transfer Learning is concerned with the application of knowledge gained from solving a problem to a different but related problem domain. In this paper, we propose a method and efficient algorithm for ranking and selecting representations from a Restricted Boltzmann Machine trained on a source domain to be transferred onto a target domain. Experiments carried out using the MNIST, ICDAR and TiCC...

Journal: :IACR Cryptology ePrint Archive 2013
Zhengjun Cao Lihua Liu

In 2011, the authors [8] presented an adaptive oblivious transfer (OT) scheme based on Decisional 3-Party Diffie-Hellman (3DDH) assumption. The encryption used in the scheme is a combination of the Boneh-Boyen IBE scheme and a variation of the Hohenberger-Waters signature. The scheme is somewhat inefficient since it combines the two underlying schemes in a simple way. In this paper, we present ...

2008
Shin-Young Cheong Michael G. Safonov

In this paper, a new bumpless transfer method is introduced based on slow-fast decomposition of the controller. The method is especially well-suited to situations in which the plant model is poor or yet to be identified, as may be the case in adaptive switching control. Simulation results are presented.

2009
Alfredo Rial Markulf Kohlweiss Bart Preneel

An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol between a vendor and a buyer. The vendor sells a set of messages m1, . . . ,mN with prices p1, . . . , pN . In each transfer phase i = 1, . . . , k, the buyer chooses a selection value σi ∈ {1, . . . ,N } and interacts with the vendor to buy message mσi in such a way that the vendor does not learn σi and the b...

Journal: :CoRR 2017
Su Zhu Kai Yu

Semantic transfer is an important problem of the language understanding (LU), which is about how the recognition pattern of a semantic concept benefits other associated concepts. In this paper, we propose a new semantic representation based on combinatory concepts. Semantic slot is represented as a composition of different atomic concepts in different semantic dimensions. Specifically, we propo...

2003
B. Minaie W. Li J. Gou Y. Chen A. Mamishev A. Mescher

Resin Transfer Molding (RTM) is a manufacturing process that involves injection of liquid resin into a closed mold cavity containing preset fiber mats and a subsequent curing stage. Mold filling is a crucial stage for quality part productions. In order to automate production and minimize the formation of defects, control of mold filling is needed. In this paper, direct adaptive control strategy...

2011
Andrzej Królikowski Dariusz Horla

In this paper we propose for scalar plants an adaptive LQG controller with adaptive input sensitivity function/loop transfer recovery of an associated adaptive LQ design. The sensitivity recovery can be viewed as a frequency-shaped loop recovery where the weights involve a sensitivity function. The adaptive loop/sensitivity recovery is achieved by feeding back the estimation residuals to the co...

2010
Matthew Green Susan Hohenberger

In an adaptive oblivious transfer (OT) protocol, a sender commits to a database of messages and then repeatedly interacts with a receiver in such a way that the receiver obtains one message per interaction of his choice (and nothing more) while the sender learns nothing about any of the choices. Recently, there has been significant effort to design practical adaptive OT schemes and to use these...

2009

An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol betweena vendor and a buyer. The vendor sells a set of messagesm1, . . .,mN with pricesp1, . . . ,pN . Ineach transfer phase i = 1, . . . , k, the buyer chooses a selection value σi ∈ {1, . . . ,N } and interactswith the vendor to buy messagemσi in such a way that the vendor doe...

2011
Kaoru Kurosawa Ryo Nojima Le Trieu Phong

We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To this end, we present two generic constructions of adaptive OT, one of which utilizes verifiable shuffles together with threshold decryption schemes, while the other uses permutation networks together with what we call ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید