Sciweavers

732 search results - page 99 / 147
» corr 2011
Sort
View
164
Voted
CORR
2011
Springer
159views Education» more  CORR 2011»
14 years 11 months ago
Scalable constructions of fractional repetition codes in distributed storage systems
Abstract—In distributed storage systems built using commodity hardware, it is necessary to store multiple replicas of every data chunk in order to ensure system reliability. In s...
Joseph C. Koo, John T. Gill III
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 11 months ago
An Analysis of Optimal Link Bombs
We analyze the recent phenomenon termed a Link Bomb, and investigate the optimal attack pattern for a group of web pages attempting to link bomb a specific web page. The typical ...
Sibel Adali, Tina Liu, Malik Magdon-Ismail
127
Voted
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 11 months ago
Study of Throughput and Delay in Finite-Buffer Line Networks
—In this work, we study the effects of finite buffers on the throughput and delay of line networks with erasure links. We identify the calculation of performance parameters such...
Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri
138
Voted
CORR
2011
Springer
229views Education» more  CORR 2011»
14 years 11 months ago
"Improved FCM algorithm for Clustering on Web Usage Mining"
In this paper we present clustering method is very sensitive to the initial center values ,requirements on the data set too high, and cannot handle noisy data the proposal method ...
K. Suresh
CORR
2011
Springer
326views Education» more  CORR 2011»
14 years 10 months ago
Mining User Comment Activity for Detecting Forum Spammers in YouTube
Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common p...
Ashish Sureka