Sciweavers

8068 search results - page 1258 / 1614
» Java Data Objects
Sort
View
SISAP
2008
IEEE
98views Data Mining» more  SISAP 2008»
15 years 10 months ago
On Reinsertions in M-tree
In this paper we introduce a new M-tree building method, utilizing the classic idea of forced reinsertions. In case a leaf is about to split, some distant objects are removed from...
Jakub Lokoc, Tomás Skopal
100
Voted
SISAP
2008
IEEE
115views Data Mining» more  SISAP 2008»
15 years 10 months ago
A Dynamic Pivot Selection Technique for Similarity Search
All pivot-based algorithms for similarity search use a set of reference points called pivots. The pivot-based search algorithm precomputes some distances to these reference points...
Benjamin Bustos, Oscar Pedreira, Nieves R. Brisabo...
192
Voted
VTC
2008
IEEE
185views Communications» more  VTC 2008»
15 years 10 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
AIMSA
2008
Springer
15 years 10 months ago
Dealing with Spoken Requests in a Multimodal Question Answering System
Abstract. This paper reports on experiments performed in the development of the QALL-ME system, a multilingual QA infrastructure capable of handling input requests both in written ...
Roberto Gretter, Milen Kouylekov, Matteo Negri
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 10 months ago
Performance Measurement, Evaluation and Analysis of Push-to-Talk in 3G Networks
— Push-to-talk over Cellular (PoC) is considered as one of important applications in Next Generation Networks (NGN). The main objective of this study is to investigate the perfor...
Wei-Peng Chen, Steven Licking, Takashi Ohno, Satos...
« Prev « First page 1258 / 1614 Last » Next »