Sciweavers

8094 search results - page 1614 / 1619
» Improvements in Formula Generalization
Sort
View
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 3 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
12 years 3 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
WSDM
2012
ACM
258views Data Mining» more  WSDM 2012»
12 years 3 months ago
Large-scale analysis of individual and task differences in search result page examination strategies
Understanding the impact of individual and task differences on search result page examination strategies is important in developing improved search engines. Characterizing these e...
Georg Buscher, Ryen W. White, Susan T. Dumais, Jef...
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
12 years 3 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
WSDM
2012
ACM
285views Data Mining» more  WSDM 2012»
12 years 3 months ago
Probabilistic models for personalizing web search
We present a new approach for personalizing Web search results to a specific user. Ranking functions for Web search engines are typically trained by machine learning algorithms u...
David Sontag, Kevyn Collins-Thompson, Paul N. Benn...
« Prev « First page 1614 / 1619 Last » Next »