Sciweavers

953 search results - page 188 / 191
» INEX 2007 Evaluation Measures
Sort
View
WSC
2007
13 years 9 months ago
New greedy myopic and existing asymptotic sequential selection procedures: preliminary empirical results
Statistical selection procedures can identify the best of a finite set of alternatives, where “best” is defined in terms of the unknown expected value of each alternative’...
Stephen E. Chick, Jürgen Branke, Christian Sc...
IMC
2007
ACM
13 years 8 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
IMC
2007
ACM
13 years 8 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
LREC
2010
186views Education» more  LREC 2010»
13 years 8 months ago
The EPAC Corpus: Manual and Automatic Annotations of Conversational Speech in French Broadcast News
This paper presents the EPAC corpus which is composed by a set of 100 hours of conversational speech manually transcribed and by the outputs of automatic tools (automatic segmenta...
Yannick Estève, Thierry Bazillon, Jean-Yves...
WCE
2007
13 years 7 months ago
Experimental Study on Lightning Characteristics of Electronic Equipment's Power Supply
—Lightning protection for power supply of electronic equipment is an important problem of low-voltage lightning protection systems. In this paper, lightning characteristics of el...
Chai Yajing, Zhou Wenjun, He Ruidong, Zhao Luxing