Sciweavers

2180 search results - page 316 / 436
» Algorithms for discovering bucket orders from data
Sort
View
WCNC
2008
IEEE
15 years 7 months ago
Throughput and Delay Performance Analysis of Packet Aggregation Scheme for PRMA
—Packet reservation multiple access (PRMA) protocol is an implicit reservation MAC protocol. It is initially designed for voice packets in the cellular networks [2], [3] but it is...
Qi Zhang, Villy Bæk Iversen, Frank H. P. Fit...
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 7 months ago
Optimization of Query Plans in the presence of Access Limitations
We consider the problem of querying data sources that have limited capabilities and can thus only be accessed by complying with certain binding patterns for their attributes. This ...
Andrea Calì, Diego Calvanese, Davide Martin...
ISMIR
2005
Springer
155views Music» more  ISMIR 2005»
15 years 6 months ago
Collecting Ground Truth Annotations for Drum Detection in Polyphonic Music
In order to train and test algorithms that can automatically detect drum events in polyphonic music, ground truth data is needed. This paper describes a setup used for gathering m...
Koen Tanghe, Micheline Lesaffre, Sven Degroeve, Ma...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 2 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...
110
Voted
TIFS
2008
121views more  TIFS 2008»
15 years 21 days ago
Effect of Severe Image Compression on Iris Recognition Performance
We investigate three schemes for severe compression of iris images in order to assess what their impact would be on recognition performance of the algorithms deployed today for ide...
John Daugman, Cathryn Downing