Sciweavers

323 search results - page 63 / 65
» Alert Detection in System Logs
Sort
View
IUI
2006
ACM
14 years 1 months ago
SWISH: semantic analysis of window titles and switching history
Information workers are often involved in multiple tasks and activities that they must perform in parallel or in rapid succession. In consequence, task management itself becomes y...
Nuria Oliver, Greg Smith, Chintan Thakkar, Arun C....
WWW
2009
ACM
14 years 8 months ago
Discovering users' specific geo intention in web search
Discovering users' specific and implicit geographic intention in web search can greatly help satisfy users' information needs. We build a geo intent analysis system that...
Xing Yi, Hema Raghavan, Chris Leggetter
GRID
2005
Springer
14 years 26 days ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
SIGCOMM
2004
ACM
14 years 23 days ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
EDBT
2000
ACM
13 years 11 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...