The government and industry have given the recent development of the Internet of Things in the healthcare sector significant respect. Health service providers retain data gathered from many sources and are useful for ...
详细信息
Designing an ID based signcryption scheme in the standard model is among the most interesting and important problems in cryptography. However, all the existing systems in the ID based setting, in the standard model, d...
详细信息
Anonymity is one of the most desired properties of a Proxy Re-encryption scheme. Any user communicating over the public channel, availing cloud for proxy re-encryption services requires that any entity (an attacker or...
详细信息
Paraphrases exist on different granularity levels, the most frequently used one being the sentential level. However, we argue that working on the sentential level is not optimal for both machines and humans, and that ...
详细信息
We propose a new approach to PoS tagging where in a first step, we assign a coarse-grained tag corresponding to the main syntactic category. Based on this high-precision decision, in the second step we utilize special...
详细信息
Wireless Charging Vehicles (WCVs) have been widely explored as a means of enabling continuous operation of sensors that are powered by batteries. However, the energy consumption of WCVs can be inefficient, leading to ...
详细信息
Existing salient instance detection (SID) methods typically learn from pixel-level annotated datasets. In this paper, we present the first weakly-supervised approach to the SID problem. Although weak supervision has b...
详细信息
Ever since Shamir introduced identity based cryptography in 1984, there has been a tremendous interest in designing efficient key agreement protocols in this paradigm. Since pairing is a costly operation and the compo...
详细信息
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex...
详细信息
On October 8-10,2009, an interdisciplinary group met in Beverley, Massachusetts, to evaluate the state of the art in the computational modeling of narrative. Three important findings emerged: (1) current work in compu...
详细信息
暂无评论