Sciweavers

2494 search results - page 435 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
NSPW
2003
ACM
14 years 3 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
ICASSP
2011
IEEE
13 years 1 months ago
Improving text-independent phonetic segmentation based on the Microcanonical Multiscale Formalism
In an earlier work, we proposed a novel phonetic segmentation method based on speech analysis under the Microcanonical Multiscale Formalism (MMF). The latter relies on the computa...
Vahid Khanagha, Khalid Daoudi, Oriol Pont, Hussein...
IADIS
2003
13 years 11 months ago
Developing Seamless Discovery of Scholarly and Trade Journal Resources via OAI and RSS
The usefulness of online information such as e-publishing and timely notification on the latest scientific or professional news has been widely accepted. However, access to such v...
Santiago Chumbe, Roddy MacLeod
MOBIHOC
2002
ACM
14 years 9 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
14 years 7 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal