Sciweavers

1310 search results - page 213 / 262
» Learning the k in k-means
Sort
View
SIGITE
2005
ACM
15 years 3 months ago
Hands-on approach to teaching computer networking using packet traces
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
Jeanna Neefe Matthews
SPAA
2005
ACM
15 years 3 months ago
Decentralized algorithms using both local and random probes for P2P load balancing
We study randomized algorithms for placing a sequence of n nodes on a circle with unit perimeter. Nodes divide the circle into disjoint arcs. We desire that a newly-arrived node (...
Krishnaram Kenthapadi, Gurmeet Singh Manku
ACISP
2005
Springer
15 years 3 months ago
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
DNIS
2005
Springer
102views Database» more  DNIS 2005»
15 years 3 months ago
An Improved Approach to Extract Document Summaries Based on Popularity
With the rapid growth of the Internet, most of the textual data in the form of newspapers, magazines and journals tend to be available on-line. Summarizing these texts can aid the...
P. Arun Kumar, K. Praveen Kumar, T. Someswara Rao,...
TSD
2005
Springer
15 years 3 months ago
Experimental Evaluation of Tree-Based Algorithms for Intonational Breaks Representation
Abstract. The prosodic specification of an utterance to be spoken by a Textto-Speech synthesis system can be devised in break indices, pitch accents and boundary tones. In particu...
Panagiotis Zervas, Gerasimos Xydas, Nikos Fakotaki...