Sciweavers

188 search results - page 38 / 38
» Finding Best k Policies
Sort
View
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
13 years 9 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
JSS
2008
86views more  JSS 2008»
13 years 5 months ago
Understanding knowledge sharing activities in free/open source software projects: An empirical study
Free/Open Source Software (F/OSS) projects are people-oriented and knowledge intensive software development environments. Many researchers focused on mailing lists to study coding...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...
PVLDB
2010
116views more  PVLDB 2010»
13 years 2 days ago
Schism: a Workload-Driven Approach to Database Replication and Partitioning
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...