Sciweavers

1051 search results - page 136 / 211
» Adaptive User Modelling in AthosMail
Sort
View
IADT
1998
149views more  IADT 1998»
15 years 6 months ago
Transparent Integration of Continuous Media Support into a Multimedia DBMS
Multimedia Database Management Systems (MMDBMS) have to efficiently provide the specific functionalities required by time-dependent multimedia data types. During presentation play...
Silvia Hollfelder, Florian Schmidt, Matthias Hemmj...
COLING
1996
15 years 6 months ago
Segmentation and Labelling of Slovenian Diphone Inventories
Preparation, recording, segmentation and pitch labelling of Slovenian diphone inventories are described. A special user friendly intert'ace package was developed in order to ...
Jerneja Gros, Ivo Ipsic, Simon Dobrisek, France Mi...
IJHCR
2010
131views more  IJHCR 2010»
15 years 2 months ago
Opportunistic Software Deployment in Disconnected Mobile Ad Hoc Networks
This paper presents a middleware platform allowing the dissemination of software components on handheld devices forming a disconnected MANET. It is based on a model that exploits ...
Frédéric Guidec, Nicolas Le Sommer, ...
195
Voted
ICWS
2010
IEEE
15 years 3 months ago
An Approach for Context-Aware Service Discovery and Recommendation
Given the large amount of existing services and the diversified needs nowadays, it is time-consuming for end-users to find appropriate services. To help end-users obtain their desi...
Hua Xiao, Ying Zou, Joanna Ng, Leho Nigul
CSREASAM
2006
15 years 6 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin