Sciweavers

2620 search results - page 428 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
ISMIR
2005
Springer
132views Music» more  ISMIR 2005»
14 years 2 months ago
Syncplayer - An Advanced System for Multimodal Music Access
In this paper, we present the SyncPlayer system for multimodal presentation of high quality audio and associated music-related data. Using the SyncPlayer client interface, a user ...
Frank Kurth, Meinard Müller, David Damm, Chri...
MIDDLEWARE
2005
Springer
14 years 2 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper
RAID
2005
Springer
14 years 2 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
SAFECOMP
2005
Springer
14 years 2 months ago
Safety Interfaces for Component-Based Systems
Abstract. This paper addresses the problems appearing in componentbased development of safety-critical systems. We aim at efficient reasoning about safety at system level while add...
Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea
SSD
2005
Springer
153views Database» more  SSD 2005»
14 years 2 months ago
Constrained Shortest Path Computation
This paper proposes and solves a-autonomy and k-stops shortest path problems in large spatial databases. Given a source s and a destination d, an aautonomy query retrieves a sequen...
Manolis Terrovitis, Spiridon Bakiras, Dimitris Pap...