A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Lossy Algebraic Filters with Short Tags
[chapter]
2019
Lecture Notes in Computer Science
design of robustly reusable fuzzy extractors. ...
It also allows substantial space improvements in a recent fuzzy extractor proposed by Wen and Liu (Asiacrypt 2018). ...
Recently, they were also used by Wen and Liu [45] in the construction of robustly reusable fuzzy extractors. ...
doi:10.1007/978-3-030-17253-4_2
fatcat:acteh75bjberlapiob7r2q4yj4
Engineering Ecosystems of Systems: UML Profile, Credential Design, and Risk-balanced Cellular Access Control
[article]
2021
Here, is the tuple ( in which encrypts the required attributes using the symmetric key generated using the fuzzy extractor, and are the associated helper data and randomness used in the fuzzy extractor ...
Design 2 uses a fuzzy extractor-based design with an assumption of verifier honesty. ...
doi:10.20381/ruor-27245
fatcat:adpy3mk4dvae3d4sr3l6quxi64
Deep Learning in Mobile and Wireless Networking: A Survey
[article]
2019
arXiv
pre-print
We first briefly introduce essential background and state-of-the-art in deep learning techniques with potential applications to networking. ...
[530] Reusable region lookup and reusable region propagation scheme CNN Liu et al. ...
The authors further employ reusable region lookup and reusable region propagation, to enable a region matcher to only run once per input video frame and load cached feature maps at all layers inside the ...
arXiv:1803.04311v3
fatcat:awuvyviarvbr5kd5ilqndpfsde
Deep Learning in Mobile and Wireless Networking: A Survey
2019
IEEE Communications Surveys and Tutorials
We first briefly introduce essential background and state-of-theart in deep learning techniques with potential applications to networking. ...
[533] Reusable region lookup and reusable region propagation scheme CNN Liu et al. ...
The authors further employ reusable region lookup and reusable region propagation, to enable a region matcher to only run once per input video frame and load cached feature maps at all layers inside the ...
doi:10.1109/comst.2019.2904897
fatcat:xmmrndjbsfdetpa5ef5e3v4xda
Musical Score Following and Audio Alignment
[article]
2022
arXiv
pre-print
the imperfections in audio capture and the complexities of multi-instrument polyphonic music. ...
The sequences are made up of 50-unit elements, populated with random samples of floating-point numbers from a uniform distribution over [0, 1). To reduce noise, the average of three runs is taken. ...
It can, nevertheless, be expected that if MIDI-capable instruments were used, similar results can be obtained: the issue with parallel notes can be resolved with the post-alignment step with a reasonable ...
arXiv:2205.03247v1
fatcat:oqpzybu66bfcvklidhoz4k3qca
Pretrained Transformers for Text Ranking: BERT and Beyond
2021
Proceedings of the 14th ACM International Conference on Web Search and Data Mining
This survey provides an overview of text ranking with neural network architectures known as transformers, of which BERT is the best-known example. ...
pairwise cosine similarity as interaction extractor: Mi,j = cos(qi,dj) Then, we transform each entry in M with a set of RBF-kernels [36] . ...
Even with imperfect translations, it is still possible to convey the gist of the English content, which is obviously better than nothing if the desired information doesn't exist in Bengali. ...
doi:10.1145/3437963.3441667
fatcat:6teqmlndtrgfvk5mneq5l7ecvq
Music information retrieval
2005
Annual Review of Information Science and Technology
This document includes the texts of the accepted papers along with the extended abstracts of the invited talks and poster presentations. ...
Following on the heels of last year's groundbreaking inaugural conference, we're convening with colleagues this year at the beautiful campus of Indiana University, Bloomington. ...
Lower values for correct search-keys and higher values for search-keys with one error (one random note missing). ...
doi:10.1002/aris.1440370108
fatcat:5v36lrlqbjfi5fkuxw3mzjyhhe
Intelligent Edge-Embedded Technologies for Digitising Industry
[chapter]
2022
Intelligent Edge-Embedded Technologies for Digitising Industry
The series includes research monographs, edited volumes, handbooks and textbooks, providing professionals, researchers, educators, and advanced students in the field with an invaluable insight into the ...
Baseline For baseline, the two-stream architecture [53] was used with ResNet50 as the feature extractor on both spatial and temporal streams. ...
The most common volatile memories are the dynamic random access memory (DRAM) and the static random-access memory (SRAM). ...
doi:10.13052/rp-9788770226103
fatcat:mgz277pmkbetvbpoaomoktzgzi
Plan Recognition (Dagstuhl Seminar 11141) Formal Methods in Molecular Biology
2011
unpublished
Two cases are discussed: uncorrelated random variables with arbitrary distribution and correlated Gaussian random variables. Examples from engineering and climate research illustrate the results. ...
randomness in transcription and translation. ...
In this talk, artificial immune systems, in particular clonal selection algorithms used for optimization, are considered from the perspective of general randomized search heuristics. ...
fatcat:avtfcawkbvcmtjermu24aonau4
On the surprising capacity of linear combinations of embeddings for natural language processing
[article]
2019
User code is often unaware and thereby reusable with respect to whether its inputs are TensorFlow tensors or native Julia arrays by utilizing duck-typing. ...
The automatic downloading of data is important to allow for robustly replicable scientific code. ...
Horvat and Byrne (2014) solve this by simply connecting the start to the end with a zero cost link. ...
doi:10.26182/w0c2-6887
fatcat:hacpoc35tne3pmcfy5wfdl6dsq