Sciweavers

116 search results - page 20 / 24
» Modeling structured event streams in system level performanc...
Sort
View
SIGMETRICS
2008
ACM
121views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems
Two schemes proposed to cope with unrecoverable or latent media errors and enhance the reliability of RAID systems are examined. The first scheme is the established, widely used d...
Ilias Iliadis, Robert Haas, Xiao-Yu Hu, Evangelos ...
BIBE
2007
IEEE
169views Bioinformatics» more  BIBE 2007»
14 years 1 months ago
Combining Semantics, Context, and Statistical Evidence in Genomics Literature Search
—We present an information retrieval model for combining evidence from concept-based semantics, term statistics, and context for improving search precision of genomics literature...
Jay Urbain, Nazli Goharian, Ophir Frieder
DSOM
2008
Springer
13 years 9 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
PR
2008
141views more  PR 2008»
13 years 7 months ago
Robust and efficient multiclass SVM models for phrase pattern recognition
Phrase pattern recognition (phrase chunking) refers to automatic approaches for identifying predefined phrase structures in a stream of text. Support vector machines (SVMs)-based ...
Yu-Chieh Wu, Yue-Shi Lee, Jie-Chi Yang
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...