Sciweavers

681 search results - page 31 / 137
» ets 2006
Sort
View
TON
2010
179views more  TON 2010»
14 years 10 months ago
Network Coding-Aware Routing in Wireless Networks
A recent approach--COPE, presented by Katti et al. (Proc. ACM SIGCOMM 2006, pp. 243
Sudipta Sengupta, Shravan K. Rayanchu, Suman Baner...
118
Voted
JCNS
2002
74views more  JCNS 2002»
15 years 3 months ago
States of High Conductance in a Large-Scale Model of the Visual Cortex
This paper reports on the consequences of large, activity dependent, synaptic conductances for neurons in a large-scale neuronal network model of the input layer 4C of the Macaque ...
Michael Shelley, David McLaughlin, Robert Shapley,...
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 3 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao
140
Voted
EMNLP
2008
15 years 5 months ago
Phrase Translation Probabilities with ITG Priors and Smoothing as Learning Objective
The conditional phrase translation probabilities constitute the principal components of phrase-based machine translation systems. These probabilities are estimated using a heurist...
Markos Mylonakis, Khalil Sima'an
GFKL
2006
Springer
89views Data Mining» more  GFKL 2006»
15 years 7 months ago
The Relationship of Word Length and Sentence Length: The Inter-Textual Perspective
The present study concentrates on the relation between sentence length (SL) and word length (WL) as a possible factor in text classification. The dependence of WL and SL is discuss...
Peter Grzybek, Ernst Stadlober, Emmerich Kelih