Sciweavers

5880 search results - page 1147 / 1176
» Data Clustering: A Review
Sort
View
CCGRID
2007
IEEE
14 years 1 months ago
Exploiting Lustre File Joining for Effective Collective IO
Lustre is a parallel file system that presents high aggregated IO bandwidth by striping file extents across many storage devices. However, our experiments indicate excessively wid...
Weikuan Yu, Jeffrey S. Vetter, Shane Canon, Song J...
HPDC
2007
IEEE
14 years 1 months ago
A statistical approach to risk mitigation in computational markets
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...
Thomas Sandholm, Kevin Lai
ICRA
2007
IEEE
160views Robotics» more  ICRA 2007»
14 years 1 months ago
Adaptive Sampling for Multi-Robot Wide-Area Exploration
— The exploration problem is a central issue in mobile robotics. A complete coverage is not practical if the environment is large with a few small hotspots, and the sampling cost...
Kian Hsiang Low, Geoffrey J. Gordon, John M. Dolan...
AIRWEB
2007
Springer
14 years 1 months ago
Extracting Link Spam using Biased Random Walks from Spam Seed Sets
Link spam deliberately manipulates hyperlinks between web pages in order to unduly boost the search engine ranking of one or more target pages. Link based ranking algorithms such ...
Baoning Wu, Kumar Chellapilla
CCS
2007
ACM
14 years 1 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
« Prev « First page 1147 / 1176 Last » Next »