Sciweavers

648 search results - page 99 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
ICPP
2009
IEEE
15 years 6 days ago
Mediacoop: Hierarchical Lookup for P2P-VoD Services
The random seeking in P2P-VoD system requires efficient lookup for "good" suppliers. The main challenge is that good suppliers should meet two requirements: "conten...
Tieying Zhang, Jianming Lv, Xueqi Cheng
SIGMETRICS
2010
ACM
113views Hardware» more  SIGMETRICS 2010»
14 years 9 months ago
Reliability analysis of deduplicated and erasure-coded storage
Space efficiency and data reliability are two primary concerns for modern storage systems. Chunk-based deduplication, which breaks up data objects into single-instance chunks that...
Xiaozhou Li, Mark Lillibridge, Mustafa Uysal
JCST
2011
89views more  JCST 2011»
14 years 9 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 8 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 8 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communities...
Karine Barzilai-Nahon