Sciweavers

404 search results - page 78 / 81
» Querying Data under Access Limitations
Sort
View
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
14 years 21 days ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
JAIR
2010
143views more  JAIR 2010»
13 years 6 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield
MSS
2005
IEEE
182views Hardware» more  MSS 2005»
14 years 1 months ago
Evaluation of Advanced TCP Stacks in the iSCSI Environment using Simulation Model
Enterprise storage demands have overwhelmed traditional storage mechanisms and have led to the development of Storage Area Networks (SANs). This has resulted in the design of SCSI...
Girish Motwani, K. Gopinath
BMCBI
2007
146views more  BMCBI 2007»
13 years 7 months ago
PubMed related articles: a probabilistic topic-based model for content similarity
Background: We present a probabilistic topic-based model for content similarity called pmra that underlies the related article search feature in PubMed. Whether or not a document ...
Jimmy J. Lin, W. John Wilbur