Sciweavers

1204 search results - page 211 / 241
» Database research in computer games
Sort
View
AH
2008
Springer
14 years 4 months ago
Concept-Based Document Recommendations for CiteSeer Authors
The information explosion in today’s electronic world has created the need for information filtering techniques that help users filter out extraneous content to identify the righ...
Kannan Chandrasekaran, Susan Gauch, Praveen Lakkar...
ISORC
2006
IEEE
14 years 3 months ago
JAAT: Java Alias Analysis Tool for Program Maintenance Activities
Alias analysis is a method for extracting sets of expressions which may possibly refer to the same memory locations during program execution. Although many researchers have alread...
Fumiaki Ohata, Katsuro Inoue
ESCIENCE
2005
IEEE
14 years 3 months ago
Iteration Aware Prefetching for Remote Data Access
1 Although processing speed, storage capacity and network bandwidth are steadily increasing, network latency remains a bottleneck for scientists accessing large remote data sets. T...
Philip J. Rhodes, Sridhar Ramakrishnan
SACMAT
2005
ACM
14 years 3 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
ISMIR
2004
Springer
79views Music» more  ISMIR 2004»
14 years 3 months ago
Towards a Socio-cultural Compatibility of MIR Systems
Future MIR systems will be of great use and pleasure for potential users. If researchers have a clear picture about their “customers” in mind they can aim at building and eval...
Stephan Baumann, Tim Pohle, Shankar Vembu