Sciweavers

9186 search results - page 1399 / 1838
» A Module System for Scheme
Sort
View
ICWN
2003
15 years 5 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inef...
Sooksan Panichpapiboon, Jon M. Peha
144
Voted
LFP
1992
140views more  LFP 1992»
15 years 5 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein
CCS
2010
ACM
15 years 4 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
CORR
2007
Springer
132views Education» more  CORR 2007»
15 years 4 months ago
On Compact Routing for the Internet
The Internet’s routing system is facing stresses due to its poor fundamental scaling properties. Compact routing is a research field that studies fundamental limits of routing ...
Dmitri V. Krioukov, Kimberly C. Claffy, Kevin R. F...
TASLP
2008
143views more  TASLP 2008»
15 years 4 months ago
Strategies to Improve the Robustness of Agglomerative Hierarchical Clustering Under Data Source Variation for Speaker Diarizatio
Many current state-of-the-art speaker diarization systems exploit agglomerative hierarchical clustering (AHC) as their speaker clustering strategy, due to its simple processing str...
K. J. Han, S. Kim, S. S. Narayanan
« Prev « First page 1399 / 1838 Last » Next »