Sciweavers

4615 search results - page 896 / 923
» A Data Analysis Method for Software Performance Prediction
Sort
View
IMC
2004
ACM
14 years 1 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
BMCBI
2005
130views more  BMCBI 2005»
13 years 8 months ago
Squid - a simple bioinformatics grid
Background: BLAST is a widely used genetic research tool for analysis of similarity between nucleotide and protein sequences. This paper presents a software application entitled &...
Paulo C. Carvalho, Rafael V. Glória, Antoni...
PLDI
2005
ACM
14 years 2 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
ICCV
2001
IEEE
14 years 10 months ago
Reconstructing Surfaces Using Anisotropic Basis Functions
Point sets obtained from computer vision techniques are often noisy and non-uniform. We present a new method of surface reconstruction that can handle such data sets using anisotr...
Huong Quynh Dinh, Greg Turk, Gregory G. Slabaugh
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 3 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...