Sciweavers

6770 search results - page 1089 / 1354
» How GPUs Work
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 5 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
CHI
2010
ACM
14 years 5 months ago
The effects of diversity on group productivity and member withdrawal in online volunteer groups
The “wisdom of crowds” argument emphasizes the importance of diversity in online collaborations, such as open source projects and Wikipedia. However, decades of research on di...
Jilin Chen, Yuqing Ren, John Riedl
SAC
2010
ACM
14 years 5 months ago
Maintaining data reliability without availability in P2P storage systems
Peer-to-peer (P2P) storage is a promising technology to provide users with cheap and online persistence. However, due the instability of these infrastructures, P2P storage systems...
Lluis Pamies-Juarez, Pedro García Ló...
PPPJ
2009
ACM
14 years 5 months ago
Tracking performance across software revisions
Repository-based revision control systems such as CVS, RCS, Subversion, and GIT, are extremely useful tools that enable software developers to concurrently modify source code, man...
Nagy Mostafa, Chandra Krintz
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
14 years 5 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
« Prev « First page 1089 / 1354 Last » Next »