Sciweavers

1551 search results - page 2 / 311
» How Typical is the
Sort
View
LCN
2007
IEEE
13 years 12 months ago
Voice quality measurement in a typical router-based network
In this paper, we introduce novel mechanisms for measuring and evaluating the performance of a network and its devices, configured especially for Voice over IP (VoIP). We study the...
A. Azarfar, A. H. Jahangir
IJON
2010
178views more  IJON 2010»
13 years 4 months ago
An empirical study of two typical locality preserving linear discriminant analysis methods
: Laplacian Linear Discriminant Analysis (LapLDA) and Semi-supervised Discriminant Analysis (SDA) are two recently proposed LDA methods. They are developed independently with the a...
Lishan Qiao, Limei Zhang, Songcan Chen
I3
2007
13 years 7 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
ERCIMDL
2009
Springer
164views Education» more  ERCIMDL 2009»
14 years 6 days ago
How People Read Books Online: Mining and Visualizing Web Logs for Use Information
This paper explores how people read books online. Instead of observing individuals, we analyze usage of an online digital library of children’s books (the International Childrenâ...
Rong Chen, Anne Rose, Benjamin B. Bederson
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
13 years 9 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz