Sciweavers

1744 search results - page 308 / 349
» The Steganographic File System
Sort
View
116
Voted
WEBI
2010
Springer
15 years 1 months ago
On Using Query Logs for Static Index Pruning
Static index pruning techniques aim at removing from the posting lists of an inverted file the references to documents which are likely to be not relevant for answering user querie...
Hoang Thanh Lam, Raffaele Perego, Fabrizio Silvest...
109
Voted
GI
2009
Springer
15 years 1 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
149
Voted
TSE
2011
214views more  TSE 2011»
14 years 10 months ago
A Comparative Study of Software Model Checkers as Unit Testing Tools: An Industrial Case Study
—Conventional testing methods often fail to detect hidden flaws in complex embedded software such as device drivers or file systems. This deficiency incurs significant developmen...
Moonzoo Kim, Yunho Kim, Hotae Kim
129
Voted
CIKM
2011
Springer
14 years 3 months ago
The quality of the XML web
We collect evidence to answer the following question: Is the quality of the XML documents found on the web sufficient to apply XML technology like XQuery, XPath and XSLT? XML coll...
Steven Grijzenhout, Maarten Marx
120
Voted
SYSTOR
2009
ACM
15 years 10 months ago
The effectiveness of deduplication on virtual machine disk images
Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. While th...
Keren Jin, Ethan L. Miller