Sciweavers

2006 search results - page 293 / 402
» MUC-5 evaluation metrics
Sort
View
TELSYS
2002
73views more  TELSYS 2002»
15 years 1 months ago
Avoiding Counting to Infinity in Distance Vector Routing
The Routing Information Protocol (RIP) may introduce misleading routing information into the routing table, due to network topology changes such as link or router failures. This is...
Andreas Schmid, Christoph Steigner
114
Voted
TPDS
2002
80views more  TPDS 2002»
15 years 1 months ago
Performance Optimization Problem in Speculative Prefetching
Speculative prefetching has been proposed to improve the response time of network access. Previous studies in speculative prefetching focus on building and evaluating access models...
Nor Jaidi Tuah, Mohan Kumar, Svetha Venkatesh, Saj...
CIKM
2010
Springer
15 years 9 days ago
Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval
We explore the application of a graph representation to model similarity relationships that exist among images found on the Web. The resulting similarity-induced graph allows us t...
Barbara Poblete, Benjamin Bustos, Marcelo Mendoza,...
HUC
2010
Springer
15 years 7 days ago
Vehicular speed estimation using received signal strength from mobile phones
This paper introduces an algorithm that estimates the speed of a mobile phone by matching time-series signal strength data to a known signal strength trace from the same road. Kno...
Gayathri Chandrasekaran, Tam Vu, Alexander Varshav...
ICSE
2010
IEEE-ACM
15 years 6 days ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...