Sciweavers

6610 search results - page 1113 / 1322
» Community Structures of Networks
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 3 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
KES
2008
Springer
15 years 3 months ago
Readable Representations for Large-Scale Bipartite Graphs
Bipartite graphs appear in various scenes in the real world, and visualizing these graphs helps improve our understanding of network structures. The amount of information that is a...
Shuji Sato, Kazuo Misue, Jiro Tanaka
115
Voted
MANSCI
2008
102views more  MANSCI 2008»
15 years 3 months ago
Revenue Management of Callable Products
We introduce callable products into a finite-capacity, two-period sales or booking process where low-fare customers book first. A callable product is a unit of capacity sold at th...
Guillermo Gallego, S. G. Kou, Robert Phillips
ML
2008
ACM
100views Machine Learning» more  ML 2008»
15 years 3 months ago
Generalized ordering-search for learning directed probabilistic logical models
Abstract. Recently, there has been an increasing interest in directed probabilistic logical models and a variety of languages for describing such models has been proposed. Although...
Jan Ramon, Tom Croonenborghs, Daan Fierens, Hendri...
MTA
2008
150views more  MTA 2008»
15 years 3 months ago
Evaluation and monitoring of video quality for UMA enabled video streaming systems
This paper1 deals with monitoring user perception of multimedia presentations in a Universal Multimedia Access (UMA) enabled system using objective no-reference (NR) metrics. Thes...
R. Venkatesh Babu, Andrew Perkis, Odd Inge Hillest...
« Prev « First page 1113 / 1322 Last » Next »