Sciweavers

1733 search results - page 193 / 347
» Self-Similarity in File Systems
Sort
View
EDBT
2008
ACM
178views Database» more  EDBT 2008»
16 years 4 months ago
Compacting music signatures for efficient music retrieval
Music information retrieval is becoming very important with the ever-increasing growth of music content in digital libraries, peer-to-peer systems and the internet. While it is ea...
Bin Cui, H. V. Jagadish, Beng Chin Ooi, Kian-Lee T...
ICCCN
2007
IEEE
15 years 11 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms tha...
Theodor Richardson, Chin-Tser Huang
DATE
2010
IEEE
160views Hardware» more  DATE 2010»
15 years 9 months ago
IVF: Characterizing the vulnerability of microprocessor structures to intermittent faults
—With the advancement of CMOS manufacturing process to nano-scale, future shipped microprocessors will be increasingly vulnerable to intermittent faults. Quantitatively character...
Songjun Pan, Yu Hu, Xiaowei Li
IPCCC
1999
IEEE
15 years 9 months ago
Management policies for non-volatile write caches
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of ...
Theodore R. Haining, Darrell D. E. Long
WEBDB
1998
Springer
83views Database» more  WEBDB 1998»
15 years 9 months ago
On the Unification of Persistent Programming and the World Wide Web
In its infancy, the World-Wide Web consisted of a web of largely static hypertext documents. As time progresses it is evolving into a domain which supports almost arbitrary network...
Richard C. H. Connor, Keith Sibson, Paolo Manghi