Sciweavers

7694 search results - page 125 / 1539
» An Implementation of an Applicative File System
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Reinforcement Learning of Listener Response for Mood Classification of Audio
This paper describes a method of applying a reinforcement learning artificial intelligence to categorize audio files by mood based on listener response during a performance. The s...
Jack Stockholm, Philippe Pasquier
WWW
2004
ACM
16 years 5 months ago
Lessons from a Gnutella-web gateway
We present a gateway between the WWW and the Gnutella peer-topeer network that permits searchers on one side to be able to search and retrieve files on the other side of the gatew...
Brian D. Davison, Wei Zhang, Baoning Wu
VLDB
2004
ACM
245views Database» more  VLDB 2004»
15 years 10 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird
JSW
2007
124views more  JSW 2007»
15 years 4 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
CODES
2004
IEEE
15 years 8 months ago
Analytical models for leakage power estimation of memory array structures
There is a growing need for accurate power models at the system level. Memory structures such as caches, Branch Target Buffers (BTBs), and register files occupy significant area i...
Mahesh Mamidipaka, Kamal S. Khouri, Nikil D. Dutt,...