Sciweavers

2526 search results - page 308 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
ISI
2004
Springer
15 years 9 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ISMIR
2004
Springer
206views Music» more  ISMIR 2004»
15 years 9 months ago
Tempo And Beat Estimation Of Musical Signals
Tempo estimation is fundamental in automatic music processing and in many multimedia applications. This paper presents an automatic tempo tracking system that processes audio reco...
Miguel Alonso, Gaël Richard, Bertrand David
LCPC
2004
Springer
15 years 9 months ago
The Use of Traces for Inlining in Java Programs
We explore the effectiveness of using traces in optimization. We build a trace collection system for the Jikes Research Virtual Machine and create traces based on the execution of...
Borys J. Bradel, Tarek S. Abdelrahman
ICALT
2003
IEEE
15 years 9 months ago
Online Self-Assessment as a Learning Method
Algorithms and Programming Languages is a core subject in the BS Degree in Mathematics at the authors’ university. Some of the students are very interested in computer programmi...
Daniel Gayo-Avello, Hortensia Fernández-Cue...
ICEIS
2003
IEEE
15 years 9 months ago
The Protein Structure Prediction Module of the Prot-Grid Information System
: In this work, we describe the protein secondary structure prediction module of a distributed bio-informatics system. Protein databases contain over a million of sequenced protein...
Dimitrios Vogiatzis, Dimitrios Frosyniotis, George...