Sciweavers

1242 search results - page 239 / 249
» Digital Objects as Passwords
Sort
View
MM
2010
ACM
178views Multimedia» more  MM 2010»
14 years 9 months ago
Social audio features for advanced music retrieval interfaces
The size of personal music collections has constantly increased over the past years. As a result, the traditional metadata based lists to browse these collections have reached the...
Michael Kuhn 0002, Roger Wattenhofer, Samuel Welte...
SIGCOMM
2010
ACM
14 years 9 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
AGIS
2008
319views more  AGIS 2008»
14 years 9 months ago
An Efficient Algorithm for Raster-to-Vector Data Conversion
Data conversion from raster to vector (R2V) is a key function in Geographic Information Systems (GIS) and remote sensing (RS) image processing for integrating GIS and RS data. The...
Junhua Teng, Fahui Wang, Yu Liu
BMCBI
2010
132views more  BMCBI 2010»
14 years 9 months ago
Parallel multiplicity and error discovery rate (EDR) in microarray experiments
Background: In microarray gene expression profiling experiments, differentially expressed genes (DEGs) are detected from among tens of thousands of genes on an array using statist...
Wayne Wenzhong Xu, Clay J. Carter
91
Voted
JNW
2008
173views more  JNW 2008»
14 years 9 months ago
Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution
Recently overlay networks have emerged as an efficient and flexible method for content distribution. An overlay network is a network running on top of another network, usually the ...
J. Amutharaj, S. Radhakrishnan