Sciweavers

3229 search results - page 589 / 646
» Mixing
Sort
View
103
Voted
KBSE
2005
IEEE
15 years 6 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
91
Voted
TRIDENTCOM
2005
IEEE
15 years 6 months ago
Divide and Conquer: PC-Based Packet Trace Replay at OC-48 Speeds
Today’s Internet backbone networking devices need to be tested under realistic traffic conditions at transmission rates of OC-48 and above. While commercially available synthet...
Tao Ye, Darryl Veitch, Gianluca Iannaccone, Suprat...
MM
2005
ACM
146views Multimedia» more  MM 2005»
15 years 6 months ago
Unsupervised content discovery in composite audio
Automatically extracting semantic content from audio streams can be helpful in many multimedia applications. Motivated by the known limitations of traditional supervised approache...
Rui Cai, Lie Lu, Alan Hanjalic
CIKM
2005
Springer
15 years 6 months ago
Biasing web search results for topic familiarity
Depending on a web searcher’s familiarity with a query’s target topic, it may be more appropriate to show her introductory or advanced documents. The TREC HARD [1] track defi...
Giridhar Kumaran, Rosie Jones, Omid Madani
DIGRA
2005
Springer
15 years 6 months ago
Connecting Worlds. Fantasy Role-Playing Games, Ritual Acts and the Magic Circle
From a cultural history and game theoretical perspective my work focuses on the relationship between the fantasy subculture, fantasy role-playing games and the daily life of their...
Marinka Copier