Sciweavers

37 search results - page 3 / 8
» Automatically Deriving Choreography-Conforming Systems of Se...
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 7 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
SIGCOMM
2004
ACM
13 years 11 months ago
The design and implementation of a next generation name service for the internet
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
Venugopalan Ramasubramanian, Emin Gün Sirer
BTW
2009
Springer
173views Database» more  BTW 2009»
14 years 10 days ago
Building Chemical Information Systems - the ViFaChem II Project
: The interdisciplinary ViFaChem II project aims at providing a chemical digital library infrastructure for creating personalized information spaces. The value added services and s...
Sascha Tönnies, Benjamin Köhncke, Oliver...
ICWSM
2010
13 years 7 months ago
Devils, Angels, and Robots: Tempting Destructive Users in Social Media
Social media sites derive their value by providing a popular and dependable community for participants to engage, share, and interact. This community value and related services li...
Kyumin Lee, Brian David Eoff, James Caverlee
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 6 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé