Sciweavers

588 search results - page 69 / 118
» Querying Objects Modeled by Arbitrary Probability Distributi...
Sort
View
54
Voted
IPPS
2006
IEEE
15 years 3 months ago
Model-based evaluation of search strategies in peer-to-peer networks
This paper exploits a previously developed analytical modeling framework to compare several variations of the basic flooding search strategy in unstructured decentralized peer-to...
Rossano Gaeta, Matteo Sereno
73
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Improved F0 modeling and generation in voice conversion
F0 is an acoustic feature that varies largely from one speaker to another. F0 is characterized by a discontinuity in the transition between voiced and unvoiced sounds that present...
Aki Kunikoshi, Yao Qian, Frank K. Soong, Nobuaki M...
IPMI
2007
Springer
15 years 10 months ago
Lung Nodule Detection Via Bayesian Voxel Labeling
This paper describes a system for detecting pulmonary nodules in CT images. It aims to label individual image voxels in accordance to one of a number of anatomical (pulmonary vesse...
Paulo R. S. Mendonça, Rahul Bhotika, Fei Zh...
MP
2006
175views more  MP 2006»
14 years 9 months ago
Conditional Value-at-Risk in Stochastic Programs with Mixed-Integer Recourse
In classical two-stage stochastic programming the expected value of the total costs is minimized. Recently, mean-risk models - studied in mathematical finance for several decades -...
Rüdiger Schultz, Stephan Tiedemann
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 3 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi