YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem, and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b...
详细信息
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation by using the similar method in an English SRL system. We also explore dependency-based predicate analysis in Chinese SRL. We perform our experiments on two datasets. Our results show that dependency-based Chinese SRL is not only feasible but also superior to the constituent-based SRL in some respects.
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information are used to improve the performance. Evaluation on the AIMed corpus shows that our feature-based method achieves very encouraging performances of 68.6 and 51.0 in F-measure with 10-fold pair-wise cross-validation and 10-fold document-wise cross-validation respectively, which are comparable with other state-of-the-art feature-based methods.
In order to introduce effective text-retrieval technologies into content-based image retrieval, a novel method based on string-matching technology was presented incorporating the different sensitivity along variant di...
详细信息
A large number of high-quality web information is deeply hidden in the Web, which can not be indexed by conventional search engines, be called Deep Web. Because query interface is the only entrance to the Deep Web, we...
详细信息
Based on the analysis of color histogram for image retrieval, a new descriptor, bit-plane distribution feature(BPDF), is proposed in this paper. The image is firstly divided into eight bit-planes. Meantime, the Gray c...
详细信息
To provide cost-effective protection for sensor networks, We introduce an immunization method where the percentage of required vaccinations for immunity are close to the optimal value of a targeted immunization scheme...
详细信息
This paper proposes to use a convolution kernel over parse tree to model syntactic structure information for pronoun resolution. Our study reveals that the syntactic structure features embedded in a parse tree are ver...
详细信息
This paper proposes to use a convolution kernel over parse tree to model syntactic structure information for pronoun resolution. Our study reveals that the syntactic structure features embedded in a parse tree are very effective for pronoun resolution and these features can be well captured by the context-sensitive convolution tree kernel. Evaluation on the ACE 2003 corpus shows that among all structured syntactic feature space, shortest path tree achieves the best performance. Then we incorporate more features into SPT, result shows that SPT can use successfully with normal features. Finally, we compare our system with other pronoun resolution systems, our results are outstanding in success rate than normal features and tree kernel-based method of Yang.
暂无评论