登录
首页 » C# » AML-Efficient-Approximate-Membership

AML-Efficient-Approximate-Membership

于 2013-12-15 发布 文件大小:12598KB
0 68
下载积分: 1 下载次数: 3

代码说明:

  AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 斯坦福大学的码学家身份认同
    斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
    2023-04-19 02:10:03下载
    积分:1
  • MYCALLBACK
    MYCALLBACK
    2022-05-26 19:21:13下载
    积分:1
  • 该程序实现单层的DES算法,其中CDes.cpp为源程序,其中调用的文件功能如下:dataofText.txt文件是输入的明文,以换行分割各个数据;data...
    该程序实现单层的DES加密算法,其中CDes.cpp为源程序,其中调用的文件功能如下:dataofText.txt文件是输入的明文,以换行分割各个数据;dataofKey.txt文件时输入的密钥,以换行分割;dataofDES.txt文件是输出的加密数据,其中包括各轮子密钥以及各轮加密输出,以及最后得到的密文,在文件中都有说明。-the realization of the single DES encryption algorithm, which CDes.cpp to source files, Calling the document which functions as follows : dataofText.txt document is imported specifically, in exchange for various bits of data; dataofKey.txt paper input key to change bits; dataofDES.txt document is the output data encryption, including the wheels round and the key encryption exports, and finally the secret text in the document have been described.
    2022-05-26 17:52:28下载
    积分:1
  • AES
    说明:  matlab平台实现AES加密算法,s_盒创建等代码都包含在内。(Matlab platform to achieve AES encryption algorithm, s_ box creation code are included.)
    2019-03-26 09:26:39下载
    积分:1
  • Verilog of MD5 algorithm is realized, includes testbench at the same time .
    MD5算法的verilog实现,同时包含有testbench。-Verilog of MD5 algorithm is realized, includes testbench at the same time .
    2022-05-09 05:18:47下载
    积分:1
  • 含有常用的一些标准算法实现
    含有常用的一些加密标准算法实现- Includes the commonly used some encryption standard algorithms to realize
    2022-02-22 03:52:25下载
    积分:1
  • at88sc0104_linux
    ATSHA204加密IC驱动,附件是基于华为的安防处理器写的,用IO口模拟的I2C驱动,方便移植。(ATSHA204 encryption IC driver, attachment security processor-based Huawei written with analog IO I2C driver, easy to transplant.)
    2014-04-22 11:30:58下载
    积分:1
  • 是大方的师傅是大方的师傅说的是大方的师傅的师傅说的
    是大方的师傅是大方的师傅说的是大方的师傅的师傅说的-的师傅的师傅是大方的师傅都是
    2022-08-08 04:36:25下载
    积分:1
  • peregv
    VB程序注册机范例,控件简单实用,采用流行且难以破解的算法加密机器码、序列号、注册码,能更好地保护您的软件(VB program RI example, the controls simple and practical, using the popular and difficult to machine code to crack the encryption algorithms, serial numbers, registration codes, can better protect your software)
    2014-03-24 18:07:41下载
    积分:1
  • 字符串模糊查询 字符串模糊查询
    字符串模糊查询 字符串模糊查询-Fuzzy query string string Fuzzy Query
    2022-10-03 10:55:03下载
    积分:1
  • 696518资源总数
  • 104292会员总数
  • 28今日下载