Sciweavers

1744 search results - page 106 / 349
» The Steganographic File System
Sort
View
PDCN
2004
13 years 11 months ago
Caching large files by using P2P based client-cluster for web proxy cache
Many web cache systems and policies have been proposed. These studies, however, consider large sized objects less useful than small sized objects for the performance and evict the...
Kyungbaek Kim, Daeyeon Park
SEKE
2004
Springer
14 years 3 months ago
Mapping UML Diagrams to a Petri Net Notation for System Simulation
UML statecharts are widely used to specify the dynamic behaviours of systems . To support systematic simulation of such models, we propose an approach to map systems specified usin...
Zhaoxia Hu, Sol M. Shatz
LREC
2008
120views Education» more  LREC 2008»
13 years 11 months ago
Uncertainty Corpus: Resource to Study User Affect in Complex Spoken Dialogue Systems
We present a corpus of spoken dialogues between students and an adaptive Wizard-of-Oz tutoring system, in which student uncertainty was manually annotated in real-time. We detail ...
Katherine Forbes-Riley, Diane J. Litman, Scott Sil...
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 9 months ago
About the Lifespan of Peer to Peer Networks
In this paper we analyze the ability of peer to peer networks to deliver a complete file among the peers. Early on we motivate a broad generalization of network behavior organizing...
Rudi Cilibrasi, Zvi Lotker, Alfredo Navarra, St&ea...
FAST
2010
13 years 12 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...