Formalising Natural Languages: Applications to Natural Language Processing and Digital Humanities: 14th International Conference, Nooj 2020, Zagreb, C, Bekavac Božo, Kocijan Kristina, Silberztein Max
Описание: NooJ provides linguists with tools to develop dictionaries, regular grammars, context-free grammars, context-sensitive grammars and unrestricted grammars as well as their graphical equivalent to formalize each linguistic phenomenon.
Описание: This book constitutes the refereed proceedings of the 11th International Conference, NooJ 2017, held in Kenitra and Rabat, Morocco, in May 2017. The 20 revised full papers presented in this volume were carefully reviewed and selected from 56 submissions.
Описание: This book constitutes the refereed proceedings of the 12th International Conference, NooJ 2018, held in Palermo, Italy, in June 2018.The 17 revised full papers and 3 short papers presented in this volume were carefully reviewed and selected from 48 submissions. NooJ is a linguistic development environment that provides tools for linguists to construct linguistic resources that formalize a large gamut of linguistic phenomena: typography, orthography, lexicons for simple words, multiword units and discontinuous expressions, inflectional and derivational morphology, local, structural and transformational syntax, and semantics. The papers in this volume are organized in topical sections on vocabulary and morphology; syntax and semantics; and natural language processing applications.
Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
Автор: Linda Barone; Mario Monteleone; Max Silberztein Название: Automatic Processing of Natural-Language Electronic Texts with NooJ ISBN: 3319550012 ISBN-13(EAN): 9783319550015 Издательство: Springer Рейтинг: Цена: 9083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 10th International Conference, NooJ 2016, held Česk Budějovice, Czech Republic, in June 2016.
The 21 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. NooJ is a linguistic development environment that provides tools for linguists to construct linguistic resources that formalise a large gamut of linguistic phenomena: typography, orthography, lexicons for simple words, multiword units and discontinuous expressions, inflectional and derivational morphology, local, structural and transformational syntax, and semantics.
Описание: This book constitutes the refereed proceedings of the 9th International Conference, NooJ 2015, held in Minsk, Belarus, in June 2015.NooJ 2015 received 51 submissions. The 20 revised full papers presented in this volume were carefully reviewed and selected from the 35 papers that were presented at the conference. The papers are organized in topical sections on corpora, vocabulary and morphology; syntax and semantics; application.
Описание: Garbled Circuits.- LogStack: Stacked Garbling with O(b log b) Computation.- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.- Threshold Garbled Circuits and Ad Hoc Secure Computation.- Indistinguishability Obfuscation.- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification.- Candidate Obfuscation via Oblivious LWE Sampling.- Non-Malleable Commitments.- Black-Box Non-Interactive Non-Malleable Commitments.- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.- Zero-Knowledge Proofs.- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.- Towards Accountability in CRS Generation.- Property-Preserving Hash Functions and ORAM.- Robust Property-Preserving Hash Functions for Hamming Distance and More.- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.- Structured Encryption and Dynamic Leakage Suppression.- Blockchain.- Dynamic Ad Hoc Clock Synchronization.- TARDIS: A Foundation of Time-Lock Puzzles in UC.- Privacy and Law Enforcement.- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy.- Non-Interactive Anonymous Router.- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures.- Abuse Resistant Law Enforcement Access Systems.
Описание: Non-Interactive Zero Knowledge from Sub-exponential DDH.- On the (in)security of ROS.- New Representations of the AES Key Schedule.- Public-Key Cryptography.- Analysing the HPKE Standard.- Tightly-Secure Authenticated Key Exchange, Revisited.- Aggregatable Distributed Key Generation.- Decentralized Multi-Authority ABE for DNFs from LWE.- Isogenies.- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.- One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols.- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.- Delay Encryption.- Post-Quantum Cryptography.- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.- Improved cryptanalysis of UOV and Rainbow.- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.- Post-Quantum Multi-Party Computation.- Lattices.- A 2ⁿ/ -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.- New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.- On the ideal shortest vector problem over random rational primes.- Homomorphic Encryption.- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function.- On the Security of Homomorphic Encryption on Approximate Numbers.- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT.- Symmetric Cryptanalysis.- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.- Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.- A Deeper Look at Machine Learning-Based Cryptanalysis.
Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
Описание: This book constitutes the refereed proceedings of the 25th International Conference on Applications of Natural Language to Information Systems, NLDB 2020, held in Saarbrucken, Germany, in June 2020.*The 15 full papers and 10 short papers were carefully reviewed and selected from 68 submissions.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru