-
AML-Efficient-Approximate-Membership
AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
- 2013-12-15 16:45:53下载
- 积分:1
-
C和Java写的sepent加密算法
C和Java写的sepent加密算法-C and Java write sepent encryption algorithm
- 2022-11-08 08:35:04下载
- 积分:1
-
RSA
C++ implementaion for RSA together with the Wiener attack.
It uses NTL library for big numbers
- 2009-04-22 04:54:04下载
- 积分:1
-
在C++算法源代码
C++写的椭圆曲线加密算法库源码-source code of ECC in C++
- 2022-03-11 12:15:21下载
- 积分:1
-
AML-Efficient-Approximate-Membership
AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.
- 2013-12-15 16:45:53下载
- 积分:1
-
kstraining
一个企业软件插件,用于公司原MIS软件的解密,请需要的了解,谢谢。(An enterprise software plug-in for the company to decrypt the original MIS software, please understand the need, thank you.)
- 2013-09-10 14:26:25下载
- 积分:1
-
aadddddddddddddddddd
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDdddddddddddddddddddddddddddddddddddddddddddddd
- 2022-07-21 16:50:27下载
- 积分:1
-
LINUX下使用Ansi C编写的MD5消息散列算法
LINUX下使用Ansi C编写的MD5消息散列算法-LINUX use Ansi C prepared news MD5 hash algorithm
- 2023-08-26 05:15:03下载
- 积分:1
-
DES加密类,可以自定义key,可以更改IP置换表
DES加密类,可以自定义key,可以更改IP置换表-DES encryption type, you can customize the key, you can change the IP permutation table
- 2022-09-26 13:30:03下载
- 积分:1
-
hash
网上收集的14种hash算法。希望对大家有用。(14 kinds of hash algorithm online collection)
- 2014-02-25 19:44:37下载
- 积分:1