نتایج جستجو برای: عصاره گیرها extractors

تعداد نتایج: 13934  

Journal: :CoRR 2015
Raphael Hoffmann Luke S. Zettlemoyer Daniel S. Weld

Information Extraction (IE) aims to automatically generate a large knowledge base from natural language text, but progress remains slow. Supervised learning requires copious human annotation, while unsupervised and weakly supervised approaches do not deliver competitive accuracy. As a result, most fielded applications of IE, as well as the leading TAC-KBP systems, rely on significant amounts of...

2008
Bhavana Kanukurthi Leonid Reyzin

We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W , W ′ to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 [6] to be noninteractive, i.e., only one message P , which can be modified by an unbounded adversary, can pass from one party to the oth...

2016
Mark Sammons Christos Christodoulopoulos Parisa Kordjamshidi Daniel Khashabi Vivek Srikumar Dan Roth

When designing Natural Language Processing (NLP) applications that use Machine Learning (ML) techniques, feature extraction becomes a significant part of the development effort, whether developing a new application or attempting to reproduce results reported for existing NLP tasks. We present EDISON, a Java library of feature generation functions used in a suite of state-of-the-art NLP tools, b...

Journal: :Environmental science 2023

Domestic cooking is critical for release of particulate matter (PM) in indoor environments. This study tested low-cost sensors to assess PM from student studio flats different methods and establish the impact extractors.

Journal: :Pattern Recognition 2012
Jinghua Wang Jane You Qin Li Yong Xu

In an imbalanced dataset, the positive and negative classes can be quite different in both size and distribution. This degrades the performance of many feature extraction methods and classifiers. This paper proposes a method for extracting minimum positive and maximum negative features (in terms of absolute value) for imbalanced binary classification. This paper develops two models to yield the...

2005
Yan Zong Ding

We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have inconsistent views of the public random source. Such errors seem inevitable in any implementation of the model. All previous schemes and protocols in the model assume a perfectly consistent view of the public source from all ...

2017
Quentin Alamélou Paul-Edmond Berthier Stéphane Cauchie Benjamin Fuller Philippe Gaborit

A Fuzzy Extractor (Dodis et al., Eurocrypt 2004) is a two-step protocol that turns a noisy secret into a uniformly distributed key R. To eliminate noise, the generation procedure takes as input an enrollment value ω and outputsR and a helper string P that enables further reproduction ofR from some close reading ω′. Boyen highlighted the need for reusable fuzzy extractors (CCS 2004) that remain ...

Journal: :IACR Cryptology ePrint Archive 2016
Quentin Alamélou Paul-Edmond Berthier Stéphane Cauchie Philippe Gaborit

A fuzzy extractor (Dodis et al., Eurocrypt 2004) is a pair of procedures that turns a noisy secret into a uniformly distributed key R. To eliminate noise, the generation procedure takes as input an enrollment value ω and outputsR and a helper string P that enables further reproduction ofR from some close reading ω′. Boyen highlighted the need for reusable fuzzy extractors (CCS 2004) that remain...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2018
Xin Li

The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in the following five seemingly different topics: seeded non-malleable extractors, privacy amplification protocols with an active adversary, independent source extractors (and explicit Ramsey graphs), non-malleable in...

Journal: :IET Information Security 2010
Philippe Bulens François-Xavier Standaert Jean-Jacques Quisquater

Establishing a strong link between the paper medium and the data represented on it is an interesting alternative to defeat unauthorized copy and content modification attempts. Many applications would benefit from it, such as show tickets, contracts, banknotes or medical prescripts. In this paper, we present a low cost solution that establishes such a link by combining digital signatures, physic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید