In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information are used to improve the performance. Evaluation on the AIMed corpus shows that our feature-based method achieves very encouraging performances of 68.6 and 51.0 in F-measure with 10-fold pair-wise cross-validation and 10-fold document-wise cross-validation respectively, which are comparable with other state-of-the-art feature-based methods.
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem, and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b...
详细信息
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation by using the similar method in an English SRL system. We also explore dependency-based predicate analysis in Chinese SRL. We perform our experiments on two datasets. Our results show that dependency-based Chinese SRL is not only feasible but also superior to the constituent-based SRL in some respects.
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computationa...
详细信息
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computational complexity of 2D Otsu method, a fast algorithm is proposed based on improved histogram. Two-dimensional histogram is projected onto the diagonal, which forms 1D histogram with obvious peak and valley distribution. Then two-dimensional Otsu method is applied on a line that is vertical to the diagonal to find the optimal threshold. Furthermore, three look-up tables are utilized to improve the computational speed by eliminating the redundant computation in original two-dimensional Otsu method. Theoretical analysis and experimental simulation show that the proposed approach greatly enhances the speed of thresholding and has better immunity to salt and pepper noise.
OOV translations, including new words, collocations, as well as phrases, are the key flesh of a human language while an obstacle to machine translation. Some researchers manually compose the dictionary for OOV transla...
详细信息
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin...
详细信息
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are working for expressing access policies in a formal way. But it is still an open problem. This paper defines a policy language, which is named as PDPL to express access policies and access control properties in PDAC model [1]. This language unifies ldquoBANrdquo logic with past- and future- time temporal logic. We give the syntax and semantics of PDPL, and provided some examples with their English equivalents. This logic language can express belief and authorization in access control model. And it can deal with delegations of decision-making directly. It is easy for us to formulate the properties of interest in distributed systems of PDAC model through PDPL. This logical language is part of a formal system, and it will be used in an automatic model checker in the future.
The paper proposes an optimal distributed k Nearest Neighbor query processing algorithm based on Data Grid, called the opGkNN. Three steps are incorporated in the opGkNN. First when a user submits a query with a vecto...
详细信息
Quantum evolutionary algorithm (QEA) is proposed on the basis of the concept and principles of quantum computing, which is a classical meta-heuristic algorithm for the approximate solution of combinatorial optimizatio...
详细信息
暂无评论