When attempting to annotate music, it is important to consider both acoustic content and social context. This paper explores techniques for collecting and combining multiple sourc...
Douglas Turnbull, Luke Barrington, Gert R. G. Lanc...
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
We propose an automatic method for modeling a relational database that uses SQL triggers and foreign-keys to efficiently answer positive semantic queries about ground instances for...
Paea LePendu, Dejing Dou, Gwen A. Frishkoff, Jiawe...
Integrating service description, discovery, and invocation functionalities presents several fundamental problems in the management of web services and is a basic problem for compo...
Anna Sibirtseva, Zhongnan Shen, Jianwen Su, Fulian...