Sciweavers

16843 search results - page 3356 / 3369
» On Generalized Authorization Problems
Sort
View
SIGMETRICS
2011
ACM
245views Hardware» more  SIGMETRICS 2011»
12 years 9 months ago
Record and transplay: partial checkpointing for replay debugging across heterogeneous systems
Software bugs that occur in production are often difficult to reproduce in the lab due to subtle differences in the application environment and nondeterminism. To address this pr...
Dinesh Subhraveti, Jason Nieh
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 9 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
12 years 9 months ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
AAAI
2011
12 years 6 months ago
Temporal Dynamics of User Interests in Tagging Systems
Collaborative tagging systems are now deployed extensively to help users share and organize resources. Tag prediction and recommendation systems generally model user behavior as r...
Dawei Yin, Liangjie Hong, Zhenzhen Xue, Brian D. D...
APPROX
2011
Springer
197views Algorithms» more  APPROX 2011»
12 years 6 months ago
Periodicity and Cyclic Shifts via Linear Sketches
We consider the problem of identifying periodic trends in data streams. We say a signal a ∈ Rn is p-periodic if ai = ai+p for all i ∈ [n − p]. Recently, Erg¨un et al. [4] pr...
Michael S. Crouch, Andrew McGregor
« Prev « First page 3356 / 3369 Last » Next »