Sciweavers

18697 search results - page 3636 / 3740
» Systemic Security Management
Sort
View
CCGRID
2011
IEEE
14 years 8 months ago
Improving Utilization of Infrastructure Clouds
— A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either...
Paul Marshall, Kate Keahey, Timothy Freeman
EDBT
2011
ACM
199views Database» more  EDBT 2011»
14 years 8 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
HT
2011
ACM
14 years 8 months ago
Social capital increases efficiency of collaboration among Wikipedia editors
In this study we measure the impact of pre-existing social capital on the efficiency of collaboration among Wikipedia editors. To construct a social network among Wikipedians we l...
Keiichi Nemoto, Peter A. Gloor, Rob Laubacher
175
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs
—Body sensor networks (BSNs) have been developed for a set of performance-critical applications, including smart healthcare, assisted living, emergency response, athletic perform...
Zhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally,...
SIGMOD
2011
ACM
205views Database» more  SIGMOD 2011»
14 years 7 months ago
Interaction between record matching and data repairing
Central to a data cleaning system are record matching and data repairing. Matching aims to identify tuples that refer to the same real-world object, and repairing is to make a dat...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...
« Prev « First page 3636 / 3740 Last » Next »