Sciweavers

148 search results - page 23 / 30
» Fast Data Anonymization with Low Information Loss
Sort
View
WWW
2006
ACM
14 years 8 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
FAST
2008
13 years 10 months ago
Pergamum: Replacing Tape with Energy Efficient, Reliable, Disk-Based Archival Storage
As the world moves to digital storage for archival purposes, there is an increasing demand for reliable, lowpower, cost-effective, easy-to-maintain storage that can still provide ...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
TSMC
2008
172views more  TSMC 2008»
13 years 7 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
ISLPED
2004
ACM
108views Hardware» more  ISLPED 2004»
14 years 1 months ago
SEPAS: a highly accurate energy-efficient branch predictor
Designers have invested much effort in developing accurate branch predictors with short learning periods. Such techniques rely on exploiting complex and relatively large structure...
Amirali Baniasadi, Andreas Moshovos
ICDE
2007
IEEE
133views Database» more  ICDE 2007»
14 years 9 months ago
Preference-Aware Query and Update Scheduling in Web-databases
Typical web-database systems receive read-only queries, that generate dynamic web pages as a response, and writeonly updates, that keep information up-to-date. Users expect short ...
Huiming Qu, Alexandros Labrinidis