Sciweavers

363 search results - page 40 / 73
» Analyzing Large Collections of Email
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Portable and Flexible Document Access Control Mechanisms
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
Mikhail J. Atallah, Marina Bykova
INFOCOM
2010
IEEE
13 years 6 months ago
Understanding Node Localizability of Wireless Ad-hoc Networks
— Location awareness is highly critical for wireless ad-hoc and sensor networks. Many efforts have been made to solve the problem of whether or not a network can be localized. Ne...
Zheng Yang, Yunhao Liu
SDM
2007
SIAM
187views Data Mining» more  SDM 2007»
13 years 9 months ago
Topic Models over Text Streams: A Study of Batch and Online Unsupervised Learning
Topic modeling techniques have widespread use in text data mining applications. Some applications use batch models, which perform clustering on the document collection in aggregat...
Arindam Banerjee, Sugato Basu
INFOCOM
2009
IEEE
14 years 2 months ago
P2P Second Life: Experimental Validation Using Kad
: Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communic...
Matteo Varvello, C. Diout, Ernst W. Biersack
DSN
2006
IEEE
14 years 2 months ago
A large-scale study of failures in high-performance computing systems
Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations is publicly avai...
Bianca Schroeder, Garth A. Gibson