Sciweavers

244 search results - page 21 / 49
» The Case for Efficient File Access Pattern Modeling
Sort
View
TCS
2010
13 years 2 months ago
Bounds on the efficiency of black-box commitment schemes
Constructions of cryptographic primitives based on general assumptions (e.g., one-way functions) tend to be less efficient than constructions based on specific (e.g., number-theor...
Omer Horvitz, Jonathan Katz
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
14 years 7 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...
HICSS
2008
IEEE
97views Biometrics» more  HICSS 2008»
14 years 1 months ago
The Organizing Pattern of Interaction: A Knowledge Centric Approach
The organizing pattern of interaction moves from less to more understanding about the relationships that exist between concepts. The current view of organizing activities is prima...
Douglas A. Druckenmiller
EUROSYS
2007
ACM
14 years 4 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
INFOCOM
2006
IEEE
14 years 1 months ago
Proportional Replication in Peer-to-Peer Networks
— We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages....
Saurabh Tewari, Leonard Kleinrock