Sciweavers

588 search results - page 69 / 118
» Querying Objects Modeled by Arbitrary Probability Distributi...
Sort
View
IPPS
2006
IEEE
15 years 7 months ago
Model-based evaluation of search strategies in peer-to-peer networks
This paper exploits a previously developed analytical modeling framework to compare several variations of the basic flooding search strategy in unstructured decentralized peer-to...
Rossano Gaeta, Matteo Sereno
ICASSP
2011
IEEE
14 years 5 months ago
Improved F0 modeling and generation in voice conversion
F0 is an acoustic feature that varies largely from one speaker to another. F0 is characterized by a discontinuity in the transition between voiced and unvoiced sounds that present...
Aki Kunikoshi, Yao Qian, Frank K. Soong, Nobuaki M...
IPMI
2007
Springer
16 years 2 months ago
Lung Nodule Detection Via Bayesian Voxel Labeling
This paper describes a system for detecting pulmonary nodules in CT images. It aims to label individual image voxels in accordance to one of a number of anatomical (pulmonary vesse...
Paulo R. S. Mendonça, Rahul Bhotika, Fei Zh...
MP
2006
175views more  MP 2006»
15 years 1 months ago
Conditional Value-at-Risk in Stochastic Programs with Mixed-Integer Recourse
In classical two-stage stochastic programming the expected value of the total costs is minimized. Recently, mean-risk models - studied in mathematical finance for several decades -...
Rüdiger Schultz, Stephan Tiedemann
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 7 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi