Sciweavers

3042 search results - page 578 / 609
» Designing for all users: including the odd users
Sort
View
IMC
2004
ACM
14 years 1 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
MM
2004
ACM
99views Multimedia» more  MM 2004»
14 years 1 months ago
Locality preserving clustering for image database
It is important and challenging to make the growing image repositories easy to search and browse. Image clustering is a technique that helps in several ways, including image data ...
Xin Zheng, Deng Cai, Xiaofei He, Wei-Ying Ma, Xuey...
MOBICOM
2004
ACM
14 years 1 months ago
SPAWN: a swarming protocol for vehicular ad-hoc wireless networks
Future vehicular networks are expected to deploy shortrange communication technology for inter-vehicle communication. In addition to vehicle-to-vehicle communication, users will b...
Shirshanka Das, Alok Nandan, Giovanni Pau
DEXA
2004
Springer
110views Database» more  DEXA 2004»
14 years 1 months ago
An a Priori Approach for Automatic Integration of Heterogeneous and Autonomous Databases
Data integration is the process that gives users access to multiple data sources though queries against a global schema. Semantic heterogeneity has been identified as the most imp...
Ladjel Bellatreche, Guy Pierra, Dung Nguyen Xuan, ...
GECCO
2004
Springer
137views Optimization» more  GECCO 2004»
14 years 1 months ago
Achieving Shorter Search Times in Voice Conversion Using Interactive Evolution
We have already proposed using evolutionary computation to adjust the voice quality conversion parameters, and we have reported that this approach produces results that are not onl...
Yuji Sato