Sciweavers

1471 search results - page 267 / 295
» Derivation of Backup Service Management Applications from Se...
Sort
View
IUI
2004
ACM
14 years 1 months ago
Supporting user hypotheses in problem diagnosis
People are performing increasingly complicated actions on the web, such as automated purchases involving multiple sites. Things often go wrong, however, and it can be difficult to...
Earl J. Wagner, Henry Lieberman
DGO
2003
140views Education» more  DGO 2003»
13 years 9 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 7 months ago
An HTTP-Based Versioning Mechanism for Linked Data
Dereferencing a URI returns a representation of the current state of the resource identified by that URI. But, on the Web representations of prior states of a resource are also av...
Herbert Van de Sompel, Robert Sanderson, Michael L...
IWDC
2001
Springer
145views Communications» more  IWDC 2001»
14 years 1 days ago
Activating and Deactivating Repair Servers in Active Multicast Trees
Abstract. For time-constrained applications, repair-server-based active local recovery approaches can be valuable in providing low-latency reliable multicast service. However, an a...
Ping Ji, James F. Kurose, Donald F. Towsley
CONEXT
2009
ACM
13 years 8 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...