Sciweavers

36 search results - page 6 / 8
» Characterizing instant messaging from recorded logs
Sort
View
MMB
2004
Springer
149views Communications» more  MMB 2004»
14 years 27 days ago
Relating Query Popularity and File Replication in the Gnutella Peer-to-Peer Network
In this paper, we characterize the user behavior in a peer-to-peer (P2P) file sharing network. Our characterization is based on the results of an extensive passive measurement stu...
Alexander Klemm, Christoph Lindemann, Oliver P. Wa...
ICSM
2007
IEEE
14 years 1 months ago
Release Pattern Discovery: A Case Study of Database Systems
Studying the release-time activities of a software project — that is, activities that occur around the time of a major or minor release — can provide insights into both the de...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 9 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
JDWM
2010
139views more  JDWM 2010»
13 years 6 months ago
Mining Frequent Generalized Patterns for Web Personalization in the Presence of Taxonomies
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usagebased approach to generate recommendations that ...
Panagiotis Giannikopoulos, Iraklis Varlamis, Magda...
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 7 months ago
Simultaneous communication in noisy channels
A sender wishes to broadcast a message of length n over an alphabet of size k to r users, where each user i, 1 i r should be able to receive one of possible mi messages. The cha...
Amit Weinstein