Sciweavers

244 search results - page 21 / 49
» The Case for Efficient File Access Pattern Modeling
Sort
View
TCS
2010
14 years 9 months ago
Bounds on the efficiency of black-box commitment schemes
Constructions of cryptographic primitives based on general assumptions (e.g., one-way functions) tend to be less efficient than constructions based on specific (e.g., number-theor...
Omer Horvitz, Jonathan Katz
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
16 years 2 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...
115
Voted
HICSS
2008
IEEE
97views Biometrics» more  HICSS 2008»
15 years 9 months ago
The Organizing Pattern of Interaction: A Knowledge Centric Approach
The organizing pattern of interaction moves from less to more understanding about the relationships that exist between concepts. The current view of organizing activities is prima...
Douglas A. Druckenmiller
EUROSYS
2007
ACM
15 years 11 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
132
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Proportional Replication in Peer-to-Peer Networks
— We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages....
Saurabh Tewari, Leonard Kleinrock