Sciweavers

1232 search results - page 245 / 247
» Evaluating role mining algorithms
Sort
View
PPOPP
2010
ACM
14 years 4 months ago
A distributed placement service for graph-structured and tree-structured data
Effective data placement strategies can enhance the performance of data-intensive applications implemented on high end computing clusters. Such strategies can have a significant i...
Gregory Buehrer, Srinivasan Parthasarathy, Shirish...
CIKM
2009
Springer
14 years 2 months ago
Vetting the links of the web
Many web links mislead human surfers and automated crawlers because they point to changed content, out-of-date information, or invalid URLs. It is a particular problem for large, ...
Na Dai, Brian D. Davison
IMC
2006
ACM
14 years 1 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
SIGIR
2004
ACM
14 years 1 months ago
Belief revision for adaptive information retrieval
Applying Belief Revision logic to model adaptive information retrieval is appealing since it provides a rigorous theoretical foundation to model partiality and uncertainty inheren...
Raymond Y. K. Lau, Peter Bruza, Dawei Song
MDM
2004
Springer
133views Communications» more  MDM 2004»
14 years 29 days ago
Cache-Miss-Initiated Prefetch in Mobile Environments
Prefetching has been widely used to improve system performance in mobile environments. Since prefetching consumes system resources, such as bandwidth and power, it is important to...
Hui Song, Guohong Cao