Sciweavers

1717 search results - page 239 / 344
» Data Integrity in a Distributed Storage System
Sort
View
WWW
2005
ACM
14 years 9 months ago
Clustering for probabilistic model estimation for CF
Based on the type of collaborative objects, a collaborative filtering (CF) system falls into one of two categories: item-based CF and user-based CF. Clustering is the basic idea i...
Qing Li, Byeong Man Kim, Sung-Hyon Myaeng
DRM
2003
Springer
14 years 2 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
JCM
2006
104views more  JCM 2006»
13 years 9 months ago
CLog: Low Cost Gigabit Full Packet Logging
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
ICDCS
2012
IEEE
11 years 11 months ago
PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems
Abstract—Virtualized cloud systems are prone to performance anomalies due to various reasons such as resource contentions, software bugs, and hardware failures. In this paper, we...
Yongmin Tan, Hiep Nguyen, Zhiming Shen, Xiaohui Gu...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
13 years 9 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell