Sciweavers

1103 search results - page 168 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
CPM
2000
Springer
141views Combinatorics» more  CPM 2000»
13 years 11 months ago
A Lower Bound for the Breakpoint Phylogeny Problem
Breakpoint phylogenies methods have been shown to be an effective way to extract phylogenetic information from gene order data. Currently, the only practical breakpoint phylogeny a...
David Bryant
FAST
2010
13 years 10 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
ICASSP
2011
IEEE
12 years 11 months ago
Hilbert envelope based features for robust speaker identification under reverberant mismatched conditions
It is well known that MFCC based speaker identification (SID) systems easily break down under mismatched training and test conditions. One such mismatch occurs when a SID system ...
Seyed Omid Sadjadi, John H. L. Hansen
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
14 years 1 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signi...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...
TLSDKCS
2010
13 years 2 months ago
Improving Retrievability and Recall by Automatic Corpus Partitioning
Abstract. With increasing volumes of data, much effort has been devoted to finding the most suitable answer to an information need. However, in many domains, the question whether a...
Shariq Bashir, Andreas Rauber