Sciweavers

4201 search results - page 36 / 841
» Our Users have Root!
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 1 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
AAAI
2010
13 years 9 months ago
User-Specific Learning for Recognizing a Singer's Intended Pitch
We consider the problem of automatic vocal melody transcription: translating an audio recording of a sung melody into a musical score. While previous work has focused on finding t...
Andrew Guillory, Sumit Basu, Dan Morris
CATA
2003
13 years 9 months ago
A Restaurant Finder using Belief-Desire-Intention Agent Model and Java Technology
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Dongqing Lin, Thomas P. Wiggen, Chang-Hyun Jo
CLUSTER
2002
IEEE
14 years 1 months ago
High Performance User Level Sockets over Gigabit Ethernet
While a number of User-Level Protocols have been developed to reduce the gap between the performance capabilities of the physical network and the performance actually available, a...
Pavan Balaji, Piyush Shivam, Pete Wyckoff, Dhabale...
IPPS
2002
IEEE
14 years 29 days ago
Can User-Level Protocols Take Advantage of Multi-CPU NICs?
Modern high speed interconnects such as Myrinet and Gigabit Ethernet have shifted the bottleneck in communication from the interconnect to the messaging software at the sending an...
Piyush Shivam, Pete Wyckoff, Dhabaleswar K. Panda