Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








10 Hits in 3.4 sec

Lossy Algebraic Filters with Short Tags [chapter]

Benoît Libert, Chen Qian
2019 Lecture Notes in Computer Science  
design of robustly reusable fuzzy extractors.  ...  It also allows substantial space improvements in a recent fuzzy extractor proposed by Wen and Liu (Asiacrypt 2018).  ...  Recently, they were also used by Wen and Liu [45] in the construction of robustly reusable fuzzy extractors.  ... 
doi:10.1007/978-3-030-17253-4_2 fatcat:acteh75bjberlapiob7r2q4yj4

Engineering Ecosystems of Systems: UML Profile, Credential Design, and Risk-balanced Cellular Access Control [article]

David Bissessar, University, My
2021
Here, is the tuple ( in which encrypts the required attributes using the symmetric key generated using the fuzzy extractor, and are the associated helper data and randomness used in the fuzzy extractor  ...  Design 2 uses a fuzzy extractor-based design with an assumption of verifier honesty.  ... 
doi:10.20381/ruor-27245 fatcat:adpy3mk4dvae3d4sr3l6quxi64

Deep Learning in Mobile and Wireless Networking: A Survey [article]

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 arXiv   pre-print
We first briefly introduce essential background and state-of-the-art in deep learning techniques with potential applications to networking.  ...  [530] Reusable region lookup and reusable region propagation scheme CNN Liu et al.  ...  The authors further employ reusable region lookup and reusable region propagation, to enable a region matcher to only run once per input video frame and load cached feature maps at all layers inside the  ... 
arXiv:1803.04311v3 fatcat:awuvyviarvbr5kd5ilqndpfsde

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
We first briefly introduce essential background and state-of-theart in deep learning techniques with potential applications to networking.  ...  [533] Reusable region lookup and reusable region propagation scheme CNN Liu et al.  ...  The authors further employ reusable region lookup and reusable region propagation, to enable a region matcher to only run once per input video frame and load cached feature maps at all layers inside the  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

Musical Score Following and Audio Alignment [article]

Lin Hao Lee
2022 arXiv   pre-print
the imperfections in audio capture and the complexities of multi-instrument polyphonic music.  ...  The sequences are made up of 50-unit elements, populated with random samples of floating-point numbers from a uniform distribution over [0, 1). To reduce noise, the average of three runs is taken.  ...  It can, nevertheless, be expected that if MIDI-capable instruments were used, similar results can be obtained: the issue with parallel notes can be resolved with the post-alignment step with a reasonable  ... 
arXiv:2205.03247v1 fatcat:oqpzybu66bfcvklidhoz4k3qca

Pretrained Transformers for Text Ranking: BERT and Beyond

Andrew Yates, Rodrigo Nogueira, Jimmy Lin
2021 Proceedings of the 14th ACM International Conference on Web Search and Data Mining  
This survey provides an overview of text ranking with neural network architectures known as transformers, of which BERT is the best-known example.  ...  pairwise cosine similarity as interaction extractor: Mi,j = cos(qi,dj) Then, we transform each entry in M with a set of RBF-kernels [36] .  ...  Even with imperfect translations, it is still possible to convey the gist of the English content, which is obviously better than nothing if the desired information doesn't exist in Bengali.  ... 
doi:10.1145/3437963.3441667 fatcat:6teqmlndtrgfvk5mneq5l7ecvq

Music information retrieval

J. Stephen Downie
2005 Annual Review of Information Science and Technology  
This document includes the texts of the accepted papers along with the extended abstracts of the invited talks and poster presentations.  ...  Following on the heels of last year's groundbreaking inaugural conference, we're convening with colleagues this year at the beautiful campus of Indiana University, Bloomington.  ...  Lower values for correct search-keys and higher values for search-keys with one error (one random note missing).  ... 
doi:10.1002/aris.1440370108 fatcat:5v36lrlqbjfi5fkuxw3mzjyhhe

Intelligent Edge-Embedded Technologies for Digitising Industry [chapter]

Ovidiu Vermesan, Mario Diaz Nava
2022 Intelligent Edge-Embedded Technologies for Digitising Industry  
The series includes research monographs, edited volumes, handbooks and textbooks, providing professionals, researchers, educators, and advanced students in the field with an invaluable insight into the  ...  Baseline For baseline, the two-stream architecture [53] was used with ResNet50 as the feature extractor on both spatial and temporal streams.  ...  The most common volatile memories are the dynamic random access memory (DRAM) and the static random-access memory (SRAM).  ... 
doi:10.13052/rp-9788770226103 fatcat:mgz277pmkbetvbpoaomoktzgzi

Plan Recognition (Dagstuhl Seminar 11141) Formal Methods in Molecular Biology

Robert Goldman, Christopher Geib, Henry Kautz, Tamim, Michael Breuß, Alfred Bruckstein, Petros, Rainer Breitling, Adelinde Uhrmacher, Frank Bruggeman, Corrado, Hamish Cunningham (+5 others)
2011 unpublished
Two cases are discussed: uncorrelated random variables with arbitrary distribution and correlated Gaussian random variables. Examples from engineering and climate research illustrate the results.  ...  randomness in transcription and translation.  ...  In this talk, artificial immune systems, in particular clonal selection algorithms used for optimization, are considered from the perspective of general randomized search heuristics.  ... 
fatcat:avtfcawkbvcmtjermu24aonau4

On the surprising capacity of linear combinations of embeddings for natural language processing [article]

Lyndon White
2019
User code is often unaware and thereby reusable with respect to whether its inputs are TensorFlow tensors or native Julia arrays by utilizing duck-typing.  ...  The automatic downloading of data is important to allow for robustly replicable scientific code.  ...  Horvat and Byrne (2014) solve this by simply connecting the start to the end with a zero cost link.  ... 
doi:10.26182/w0c2-6887 fatcat:hacpoc35tne3pmcfy5wfdl6dsq