Sciweavers

4218 search results - page 583 / 844
» Complete sets of cooperations
Sort
View
CSIE
2009
IEEE
15 years 10 months ago
Evaluating Clustering Algorithms: Cluster Quality and Feature Selection in Content-Based Image Clustering
The paper presents an evaluation of four clustering algorithms: k-means, average linkage, complete linkage, and Ward’s method, with the latter three being different hierarchical...
Mesfin Sileshi, Björn Gambäck
CSMR
2009
IEEE
15 years 10 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
DSN
2009
IEEE
15 years 10 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
135
Voted
ICAC
2009
IEEE
15 years 10 months ago
Self-tuning BPEL processes
—The performance of BPEL processes depends on the composing web services. Monitoring web service performance and adapting to changes in service performance are essential for crea...
Adina D. Mosincat, Walter Binder
135
Voted
ICASSP
2009
IEEE
15 years 10 months ago
A semi-supervised learning approach to online audio background detection
We present a framework for audio background modeling of complex and unstructured audio environments. The determination of background audio is important for understanding and predi...
Selina Chu, Shrikanth S. Narayanan, C.-C. Jay Kuo