• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,163
Next 10 →

A new string-to-dependency machine translation algorithm with a target dependency language model

by Libin Shen, Jinxi Xu, Ralph Weischedel - In Proc. of ACL , 2008
"... In this paper, we propose a novel string-todependency algorithm for statistical machine translation. With this new framework, we employ a target dependency language model during decoding to exploit long distance word relations, which are unavailable with a traditional n-gram language model. Our expe ..."
Abstract - Cited by 135 (7 self) - Add to MetaCart
experiments show that the string-to-dependency decoder achieves 1.48 point improvement in BLEU and 2.53 point improvement in TER compared to a standard hierarchical string-tostring system on the NIST 04 Chinese-English evaluation set. 1

Internet time synchronization: The network time protocol

by D. L. Mills , 1989
"... This memo describes the Network Time Protocol (NTP) designed to distribute time information in a large, diverse internet system operating at speeds from mundane to lightwave. It uses a returnabletime architecture in which a distributed subnet of time servers operating in a self-organizing, hierarchi ..."
Abstract - Cited by 628 (15 self) - Add to MetaCart
-organizing, hierarchical, master-slave configuration synchronizes local clocks within the subnet and to national time standards via wire or radio. The servers can also redistribute time information within a network via local routing algorithms and time daemons. The architectures, algorithms and protocols which have

Faceted metadata for image search and browsing

by Ka-ping Yee, Kirsten Swearingen, Kevin Li, Marti Hearst - In ACM Conference on Computer-Human Interaction , 2003
"... There are currently two dominant interface types for searching and browsing large image collections: keyword-based search, and searching by overall similarity to sample images. This paper presents an alternative in which users are able to navigate explicitly along conceptual dimensions that describe ..."
Abstract - Cited by 375 (4 self) - Add to MetaCart
that describe the images. The interface makes use of hierarchical faceted metadata and dynamically generated query previews. A usability study, conducted with 32 art history students exploring a collection of 35,000 fine arts images, compares this approach to a standard image search interface. Despite

Incorporating Contextual Information in Recommender Systems Using a Multidimensional Approach

by Gediminas Adomavicius, Ramesh Sankaranarayanan, Shahana Sen, Alexander Tuzhilin - ACM Transactions on Information Systems , 2005
"... The paper presents a multidimensional (MD) approach to recommender systems that can provide recommendations based on additional contextual information besides the typical information on users and items used in most of the current recommender systems. This approach supports multiple dimensions, exten ..."
Abstract - Cited by 236 (9 self) - Add to MetaCart
, extensive profiling, and hierarchical aggregation of recommendations. The paper also presents a multidimensional rating estimation method capable of selecting two-dimensional segments of ratings pertinent to the recommendation context and applying standard collaborative filtering or other traditional two

Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles

by Dan Boneh, Xavier Boyen - 6. , SECURE IDENTITY BASED ENCRYPTION WITHOUT RANDOM ORACLES., IN FRANKLIN [20
"... We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time t ..."
Abstract - Cited by 221 (8 self) - Add to MetaCart
to the identity that it intends to attack, whereas in the standard model the adversary is allowed to choose this identity adaptively. Our first secure IBE system extends to give a selective identity Hierarchical IBE secure without random oracles.

Object-Z: a Specification Language Advocated for the Description of Standards

by Roger Duke , Gordon Rose, Graeme Smith - COMPUTER STANDARDS AND INTERFACES , 1995
"... The importance of formalising the specification of standards has been recognised for a number of years. This paper advocates the use of the formal specification language Object-Z in the definition of standards. Object-Z is an extension to the Z language specifically to facilitate specification in ..."
Abstract - Cited by 164 (15 self) - Add to MetaCart
-Z itself. Because standards are typically large complex systems, the extra structuring afforded by the Object-Z class construct and operation expressions enables the various hierarchical relationships and the communication between objects in a system to be succinctly specified.

A simple and effective hierarchical phrase reordering model

by Michel Galley, Christopher D. Manning - In Proceedings of EMNLP 2008 , 2008
"... While phrase-based statistical machine translation systems currently deliver state-of-theart performance, they remain weak on word order changes. Current phrase reordering models can properly handle swaps between adjacent phrases, but they typically lack the ability to perform the kind of long-dista ..."
Abstract - Cited by 103 (13 self) - Add to MetaCart
-distance reorderings possible with syntax-based systems. In this paper, we present a novel hierarchical phrase reordering model aimed at improving non-local reorderings, which seamlessly integrates with a standard phrase-based system with little loss of computational efficiency. We show that this model can

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical

NoDoSE - A tool for Semi-Automatically Extracting Structured and Semistructured Data from Text Documents.

by Brad Adelberg - SIGMOD Record , 1998
"... Often interesting structured or semistructured data is not in database systems but in HTML pages, text files, or on paper. The data in these formats is not usable by standard query processing engines and hence users need a way of extracting data from these sources into a DBMS or of writing wrappers ..."
Abstract - Cited by 168 (2 self) - Add to MetaCart
Often interesting structured or semistructured data is not in database systems but in HTML pages, text files, or on paper. The data in these formats is not usable by standard query processing engines and hence users need a way of extracting data from these sources into a DBMS or of writing wrappers

Efficient Selective-ID Secure Identity Based Encryption without Random Oracles

by Dan Boneh, Xavier Boyen , 2004
"... We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to ..."
Abstract - Cited by 154 (9 self) - Add to MetaCart
to the identity that it intends to attack, whereas in the standard model the adversary is allowed to choose this identity adaptively. Our first secure IBE system extends to give a selective identity Hierarchical IBE secure without random oracles.
Next 10 →
Results 1 - 10 of 1,163
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University