Sciweavers

2539 search results - page 374 / 508
» Debugging Method Names
Sort
View
90
Voted
ISMIR
2005
Springer
179views Music» more  ISMIR 2005»
15 years 3 months ago
Discovering and Visualizing Prototypical Artists by Web-Based Co-Occurrence Analysis
Detecting artists that can be considered as prototypes for particular genres or styles of music is an interesting task. In this paper, we present an approach that ranks artists ac...
Markus Schedl, Peter Knees, Gerhard Widmer
LADC
2005
Springer
15 years 3 months ago
Group-Based Replication of On-Line Transaction Processing Servers
Several techniques for database replication using group communication have recently been proposed, namely, the Database State Machine, PostgresR, and the NODO protocol. Although a...
Alfrânio Correia Jr., A. Sousa, L. Soares, J...
LCTRTS
2005
Springer
15 years 3 months ago
Probabilistic source-level optimisation of embedded programs
Efficient implementation of DSP applications is critical for many embedded systems. Optimising C compilers for embedded processors largely focus on code generation and instructio...
Björn Franke, Michael F. P. O'Boyle, John Tho...
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 3 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
81
Voted
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 3 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...