Sciweavers

1075 search results - page 137 / 215
» Communities Detection in Large Networks
Sort
View
TASLP
2008
129views more  TASLP 2008»
14 years 9 months ago
Chroma Binary Similarity and Local Alignment Applied to Cover Song Identification
Abstract--We present a new technique for audio signal comparison based on tonal subsequence alignment and its application to detect cover versions (i.e., different performances of ...
Joan Serrà, Emilia Gómez, Perfecto H...
SEMWEB
2010
Springer
14 years 7 months ago
Making Sense of Twitter
Abstract. Twitter enjoys enormous popularity as a micro-blogging service largely due to its simplicity. On the downside, there is little organization to the Twitterverse and making...
David Laniado, Peter Mika

Publication
283views
13 years 8 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 4 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi