نتایج جستجو برای: key word
تعداد نتایج: 651123 فیلتر نتایج به سال:
objectives: stuttering is one of the most prevalent speech and language disorders. symptomology of stuttering has been surveyed from different aspects such as biological, developmental, environmental, emotional, learning and linguistic. previous researches in english-speaking people have suggested that some linguistic features such as word meanings may play a role in the frequency of speech non...
We present VPS-GradeUp – a set of 11,400 graded human decisions on usage patterns of 29 English lexical verbs from the Pattern Dictionary of English Verbs by Patrick Hanks. The annotation contains, for each verb lemma, a batch of 50 concordances with the given lemma as KWIC, and for each of these concordances we provide a graded human decision on how well the individual PDEV patterns for this p...
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard. We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the diff...
We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in ...
We introduce a generalization of Hadamard and the controlled not gates which together with the generalized Bell states, enable us to introduce new methods for quantum key distribution (QKD) of d-level quantum states (qudits). In case of eavesdropping, an error rate of d−1 d is introduced in Bob’s received qudits, so that for large d, comparison of only a tiny fraction of received qudits with th...
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...
We introduce Cro36WSD, a freely-available medium-sized lexical sample for Croatian word sense disambiguation (WSD). Cro36WSD comprises 36 words: 12 adjectives, 12 nouns, and 12 verbs, balanced across both frequency bands and polysemy levels. We adopt the multi-label annotation scheme in the hope of lessening the drawbacks of discrete sense inventories and obtaining more realistic annotations fr...
This study was designed to examine factors associated with literal interpretations of homonyms. Participants were 212 second graders, ages 7;0-8;11, who listened to a story containing 16 key words. The key words were homonymous words ('pseudo-homonyms'), nonsense words, or familiar words used accurately. While listening to the story, children selected an illustration of each key word. Later, th...
Pervasive secure computing paradigms in the publicly interconnected world pose new challenges in the architecture of future general-purpose processors. These paradigms include safer communications, storage and execution. Basic security functions like confidentiality, data integrity and user authentication can be achieved by symmetric-key, hash and public-key cryptography algorithms, respectivel...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید