For five years, we collected annual snapshots of filesystem metadata from over 60,000 Windows PC file systems in a large corporation. In this paper, we use these snapshots to s...
Nitin Agrawal, William J. Bolosky, John R. Douceur...
We describe a method for performance analysis of large software systems that combines a fast instruction-set simulator with off-line detailed analysis of segments of the execution...
Recognition of handwritten manuscripts is essential for efficient content exploitation of the valuable Old Greek historical collections. In this paper, we focus on the problem of ...
Kostas Ntzios, Basilios Gatos, Ioannis Pratikakis,...
The Bag-Of-Visual-Words (BOVW) paradigm is fast becoming a popular image representation for Content-Based Image Retrieval (CBIR), mainly because of its better retrieval effectiven...
Savvas A. Chatzichristofis, Konstantinos Zagoris, ...
: Peer-to-Peer (P2P) reputation systems are needed to evaluate the trustworthiness of participating peers and to combat selfish and malicious peer behaviors. The reputation system ...