Sciweavers

1744 search results - page 312 / 349
» What's There to Talk About
Sort
View
ICN
2007
Springer
14 years 3 months ago
Active Peer to Peer
—Peer to peer is an important way for files sharing. In existing P2P systems, users need to query and retrieve files, and have to know some knowledge, such as file names, keyword...
Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han
OOPSLA
2007
Springer
14 years 3 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
AICCSA
2006
IEEE
137views Hardware» more  AICCSA 2006»
14 years 3 months ago
Modeling Redundancy: Quantitative and Qualitative Models
Redundancy is a system property that generally refers to duplication of state information or system function. While redundancy is usually investigated in the context of fault tole...
Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shere...
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
14 years 3 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
INFOCOM
2006
IEEE
14 years 3 months ago
Theory and Network Applications of Dynamic Bloom Filters
Abstract— A bloom filter is a simple, space-efficient, randomized data structure for concisely representing a static data set, in order to support approximate membership querie...
Deke Guo, Jie Wu, Honghui Chen, Xueshan Luo