Sciweavers

18697 search results - page 3637 / 3740
» Systemic Security Management
Sort
View
CIKM
2011
Springer
14 years 4 months ago
MTopS: scalable processing of continuous top-k multi-query workloads
A continuous top-k query retrieves the k most preferred objects in a data stream according to a given preference function. These queries are important for a broad spectrum of appl...
Avani Shastri, Di Yang, Elke A. Rundensteiner, Mat...
VEE
2012
ACM
214views Virtualization» more  VEE 2012»
14 years 2 days ago
CompSC: live migration with pass-through devices
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
14 years 2 days ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
ICDE
2012
IEEE
237views Database» more  ICDE 2012»
13 years 7 months ago
On Discovery of Traveling Companions from Streaming Trajectories
— The advance of object tracking technologies leads to huge volumes of spatio-temporal data collected in the form of trajectory data stream. In this study, we investigate the pro...
Lu An Tang, Yu Zheng, Jing Yuan, Jiawei Han, Alice...
175
Voted
KDD
2012
ACM
222views Data Mining» more  KDD 2012»
13 years 7 months ago
Rise and fall patterns of information diffusion: model and implications
The recent explosion in the adoption of search engines and new media such as blogs and Twitter have facilitated faster propagation of news and rumors. How quickly does a piece of ...
Yasuko Matsubara, Yasushi Sakurai, B. Aditya Praka...
« Prev « First page 3637 / 3740 Last » Next »