Sciweavers

770 search results - page 104 / 154
» An Approach to Requirements Encapsulation with Clustering
Sort
View
100
Voted
ICMCS
2005
IEEE
140views Multimedia» more  ICMCS 2005»
15 years 7 months ago
CSR: Speaker Recognition from Compressed VoIP Packet Stream
VoIP applications require the ability to identify speakers in real time. This paper presents Compressed Speaker Recognition (CSR), an innovative approach to perform speaker recogn...
Charu C. Aggarwal, David P. Olshefski, Debanjan Sa...
108
Voted
ANTSW
2004
Springer
15 years 7 months ago
Hypothesis Corroboration in Semantic Spaces with Swarming Agents
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to suppo...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
CCGRID
2009
IEEE
15 years 7 months ago
Framework for Decentralizing Legacy Applications
—Today many Peer-to-peer (P2P) applications are widely used on the Internet. Especially file sharing is a popular P2P application that has, at least partially, replaced the cent...
Jani Hautakorpi, Gonzalo Camarillo, David Lopez
CCGRID
2006
IEEE
15 years 8 months ago
ReCon: A Fast and Reliable Replica Retrieval Service for the Data Grid
The Data Grid provides a scalable infrastructure for storage resources and data distribution management. It also supports a variety of scientific applications that require access...
XiaoLi Zhou, Eunsung Kim, Jai Wug Kim, Heon Young ...
114
Voted
WIESS
2000
15 years 3 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...