Sciweavers

681 search results - page 31 / 137
» et 2006
Sort
View
TON
2010
179views more  TON 2010»
14 years 4 months ago
Network Coding-Aware Routing in Wireless Networks
A recent approach--COPE, presented by Katti et al. (Proc. ACM SIGCOMM 2006, pp. 243
Sudipta Sengupta, Shravan K. Rayanchu, Suman Baner...
JCNS
2002
74views more  JCNS 2002»
14 years 9 months ago
States of High Conductance in a Large-Scale Model of the Visual Cortex
This paper reports on the consequences of large, activity dependent, synaptic conductances for neurons in a large-scale neuronal network model of the input layer 4C of the Macaque ...
Michael Shelley, David McLaughlin, Robert Shapley,...
IJNSEC
2007
107views more  IJNSEC 2007»
14 years 9 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao
EMNLP
2008
14 years 11 months ago
Phrase Translation Probabilities with ITG Priors and Smoothing as Learning Objective
The conditional phrase translation probabilities constitute the principal components of phrase-based machine translation systems. These probabilities are estimated using a heurist...
Markos Mylonakis, Khalil Sima'an
83
Voted
GFKL
2006
Springer
89views Data Mining» more  GFKL 2006»
15 years 1 months ago
The Relationship of Word Length and Sentence Length: The Inter-Textual Perspective
The present study concentrates on the relation between sentence length (SL) and word length (WL) as a possible factor in text classification. The dependence of WL and SL is discuss...
Peter Grzybek, Ernst Stadlober, Emmerich Kelih