Sciweavers

2605 search results - page 294 / 521
» Reliability-aware scalability models for high performance co...
Sort
View
TASLP
2008
124views more  TASLP 2008»
15 years 4 months ago
Semantic Annotation and Retrieval of Music and Sound Effects
We present a computer audition system that can both annotate novel audio tracks with semantically meaningful words and retrieve relevant tracks from a database of unlabeled audio c...
Douglas Turnbull, Luke Barrington, D. Torres, Gert...
WCRE
2009
IEEE
15 years 11 months ago
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
—Current research on code clones tries to address the question whether or not code clones are harmful for the quality of software. As most of these studies are based on the fine...
Nicolas Bettenburg, Weiyi Shang, Walid Ibrahim, Br...
PKDD
2004
Springer
131views Data Mining» more  PKDD 2004»
15 years 10 months ago
Asynchronous and Anticipatory Filter-Stream Based Parallel Algorithm for Frequent Itemset Mining
Abstract In this paper we propose a novel parallel algorithm for frequent itemset mining. The algorithm is based on the filter-stream programming model, in which the frequent item...
Adriano Veloso, Wagner Meira Jr., Renato Ferreira,...
CEAS
2008
Springer
15 years 6 months ago
Personalized Spam Filtering for Gray Mail
Gray mail, messages that could reasonably be considered either spam or good by different email users, is a commonly observed issue in production spam filtering systems. In this pa...
Ming-Wei Chang, Scott Yih, Robert McCann
TWC
2008
138views more  TWC 2008»
15 years 4 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng