Sciweavers

417 search results - page 29 / 84
» Experimental Evaluation of Memory Management in Content-Cent...
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan
FAST
2008
13 years 10 months ago
AWOL: An Adaptive Write Optimizations Layer
Operating system memory managers fail to consider the population of read versus write pages in the buffer pool or outstanding I/O requests when writing dirty pages to disk or netw...
Alexandros Batsakis, Randal C. Burns, Arkady Kanev...
PVLDB
2010
133views more  PVLDB 2010»
13 years 6 months ago
RoadTrack: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness
Mobile commerce and location based services (LBS) are some of the fastest growing IT industries in the last five years. Location update of mobile clients is a fundamental capabil...
Péter Pesti, Ling Liu, Bhuvan Bamba, Arun I...
RAID
2010
Springer
13 years 6 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
TMM
2010
169views Management» more  TMM 2010»
13 years 2 months ago
An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering
This paper introduces a video copy detection system which efficiently matches individual frames and then verifies their spatio-temporal consistency. The approach for matching frame...
Matthijs Douze, Herve Jegou, Cordelia Schmid