Sciweavers

TIT
2011
128views more  TIT 2011»
13 years 6 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
TASLP
2011
13 years 6 months ago
A Probabilistic Interaction Model for Multipitch Tracking With Factorial Hidden Markov Models
—We present a simple and efficient feature modeling approach for tracking the pitch of two simultaneously active speakers. We model the spectrogram features of single speakers u...
Michael Wohlmayr, Michael Stark, Franz Pernkopf
TASLP
2011
13 years 6 months ago
A Generative Student Model for Scoring Word Reading Skills
—This paper presents a novel student model intended to automate word-list-based reading assessments in a classroom setting, specifically for a student population that includes b...
Joseph Tepperman, Sungbok Lee, Shrikanth Narayanan...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 6 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
RSA
2011
124views more  RSA 2011»
13 years 6 months ago
Sparse random graphs with clustering
In 2007 we introduced a general model of sparse random graphs with independence between the edges. The aim of this paper is to present an extension of this model in which the edge...
Béla Bollobás, Svante Janson, Oliver...
MCS
2011
Springer
13 years 6 months ago
Solving macroeconomic models with "off-the-shelf" software: An example of potential pitfalls
: When working with large-scale models or numerous small models, there can be a temptation to rely on default settings in proprietary software to derive solutions to the model. In ...
Ric D. Herbert, Peter J. Stemp
JPDC
2011
129views more  JPDC 2011»
13 years 6 months ago
Static timing analysis for modeling QoS in networks-on-chip
Networks-on-chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC’s shared resources, quality of service and resource ...
Evgeni Krimer, Isaac Keslassy, Avinoam Kolodny, Is...
JCSS
2011
154views more  JCSS 2011»
13 years 6 months ago
Model interoperability via Model Driven Development
It is widely recognised that software development is a complex process. Among the factors that contribute to its inherent complexity is the gap between the design and the formal a...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
JBI
2011
249views Bioinformatics» more  JBI 2011»
13 years 6 months ago
A reusable framework for health counseling dialogue systems based on a behavioral medicine ontology
Automated approaches to promoting health behavior change, such as exercise, diet, and medication adherence promotion, have the potential for significant positive impact on society...
Timothy W. Bickmore, Daniel Schulman, Candace L. S...
JAIR
2011
110views more  JAIR 2011»
13 years 6 months ago
Narrowing the Modeling Gap: A Cluster-Ranking Approach to Coreference Resolution
Traditional learning-based coreference resolvers operate by training the mention-pair model for determining whether two mentions are coreferent or not. Though conceptually simple ...
Altaf Rahman, Vincent Ng