Corner detection is a main concern in many computer vision applications like object recognition or image matching. Furthermore, detection is usually performed over the contour of the objects. This paper presents a nov...
详细信息
The direction chain code has been widely used in image coding and recognition for its simplicity and low storage requirement. However, the researches on how to use chain code for shape retrieval are few. The tradition...
详细信息
The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel...
详细信息
This paper explores Chinese semantic role labeling (SRL) for nominal predicates. Besides those widely used features in verbal SRL, various nominal SRL-specific features are first included. Then, we improve the perform...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information are used to improve the performance. Evaluation on the AIMed corpus shows that our feature-based method achieves very encouraging performances of 68.6 and 51.0 in F-measure with 10-fold pair-wise cross-validation and 10-fold document-wise cross-validation respectively, which are comparable with other state-of-the-art feature-based methods.
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ...
详细信息
Parallel sentences can benefit many NLP applications (e.g., machine translation, cross language information retrieval.) In this paper, the candidate bilingual webs pages are returned by submit sentence pairs to search...
详细信息
A large number of high-quality web information is deeply hidden in the Web, which can not be indexed by conventional search engines, be called Deep Web. Because query interface is the only entrance to the Deep Web, we...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem, and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
暂无评论