Sciweavers

3954 search results - page 436 / 791
» Image-based Model Completion
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...
134
Voted
ISPW
2006
IEEE
15 years 10 months ago
Simulating the Structural Evolution of Software
As functionality is added to an ageing piece of software, its original design and structure tends to erode. The underlying forces which cause such degradation have been the subject...
Benjamin Stopford, Steve Counsell
SAC
2006
ACM
15 years 10 months ago
A probability analysis for candidate-based frequent itemset algorithms
This paper explores the generation of candidates, which is an important step in frequent itemset mining algorithms, from a theoretical point of view. Important notions in our prob...
Nele Dexters, Paul W. Purdom, Dirk Van Gucht
UIST
2006
ACM
15 years 10 months ago
Huddle: automatically generating interfaces for systems of multiple connected appliances
Systems of connected appliances, such as home theaters and presentation rooms, are becoming commonplace in our homes and workplaces. These systems are often difficult to use, in p...
Jeffrey Nichols, Brandon Rothrock, Duen Horng Chau...
CSB
2005
IEEE
136views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Whole Genome Phylogeny Based on Clustered Signature String Composition
Peptide compositions constructed out of whole sets of protein sequences can be used as species signatures for phylogenetic analysis. To account for point mutations, an amino acid ...
Xiaomeng Wu, Guohui Lin, Xiu-Feng Wan, Dong Xu