Sciweavers

2229 search results - page 362 / 446
» Comparative analysis of biclustering algorithms
Sort
View
MIDDLEWARE
2005
Springer
14 years 3 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper
SCIA
2005
Springer
108views Image Analysis» more  SCIA 2005»
14 years 3 months ago
Light Field Reconstruction Using a Planar Patch Model
Light fields are known for their potential in generating 3D reconstructions of a scene from novel viewpoints without need for a model of the scene. Reconstruction of novel views, ...
Adam Bowen, Andrew Mullins, Roland G. Wilson, Nasi...
CEAS
2004
Springer
14 years 3 months ago
Learning to Extract Signature and Reply Lines from Email
: We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessi...
Vitor Rocha de Carvalho, William W. Cohen
EURONGI
2004
Springer
14 years 3 months ago
Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks
This paper presents a simulation analysis for the evaluation of the admission region of a IEEE 802.11e network adopting the EDCA (Enhanced Distributed Channel Access) mechanism. In...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
IEAAIE
2004
Springer
14 years 3 months ago
Machine Learning Approaches for Inducing Student Models
The main issue in e-learning is student modelling, i.e. the analysis of a student’s behaviour and prediction of his/her future behaviour and learning performance. Indeed, it is d...
Oriana Licchelli, Teresa Maria Altomare Basile, Ni...