Sciweavers

16843 search results - page 3361 / 3369
» On Generalized Authorization Problems
Sort
View
VEE
2012
ACM
214views Virtualization» more  VEE 2012»
12 years 2 months ago
CompSC: live migration with pass-through devices
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
VEE
2012
ACM
222views Virtualization» more  VEE 2012»
12 years 2 months ago
Unpicking the knot: teasing apart VM/application interdependencies
Flexible and efficient runtime design requires an understanding of the dependencies among the components internal to the runtime and those between the application and the runtime...
Yi Lin, Stephen M. Blackburn, Daniel Frampton
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
12 years 2 months ago
Correlating financial time series with micro-blogging activity
We study the problem of correlating micro-blogging activity with stock-market events, defined as changes in the price and traded volume of stocks. Specifically, we collect messa...
Eduardo J. Ruiz, Vagelis Hristidis, Carlos Castill...
WSDM
2012
ACM
254views Data Mining» more  WSDM 2012»
12 years 2 months ago
Maximizing product adoption in social networks
One of the key objectives of viral marketing is to identify a small set of users in a social network, who when convinced to adopt a product will influence others in the network l...
Smriti Bhagat, Amit Goyal 0002, Laks V. S. Lakshma...
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
12 years 2 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
« Prev « First page 3361 / 3369 Last » Next »