Sciweavers

2169 search results - page 379 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
MM
2006
ACM
184views Multimedia» more  MM 2006»
14 years 2 months ago
Extraction of social context and application to personal multimedia exploration
Personal media collections are often viewed and managed along the social dimension, the places we spend time at and the people we see, thus tools for extracting and using this inf...
Brett Adams, Dinh Q. Phung, Svetha Venkatesh
ICNP
2005
IEEE
14 years 2 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
SIGDOC
2005
ACM
14 years 2 months ago
Animating pervasive computing
It is difficult to present new, complex ideas in ways that are informative and interesting in situations where a vast amount of information has to be delivered and understood quic...
Andrée Woodcock, John R. Burns, Sarah Mount...
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
14 years 2 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta
MM
2004
ACM
117views Multimedia» more  MM 2004»
14 years 2 months ago
Singing voice detection in popular music
We propose a novel technique for the automatic classification of vocal and non-vocal regions in an acoustic musical signal. Our technique uses a combination of harmonic content a...
Tin Lay Nwe, Arun Shenoy, Ye Wang