Sciweavers

511 search results - page 100 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 9 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
WWW
2007
ACM
16 years 9 days ago
Globetp: template-based database replication for scalable web applications
Generic database replication algorithms do not scale linearly in throughput as all update, deletion and insertion (UDI) queries must be applied to every database replica. The thro...
Tobias Groothuyse, Swaminathan Sivasubramanian, Gu...
HPDC
2010
IEEE
15 years 22 days ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
EWCBR
2004
Springer
15 years 5 months ago
Fault Diagnosis of Industrial Robots Using Acoustic Signals and Case-Based Reasoning
In industrial manufacturing rigorous testing is used to ensure that the delivered products meet their specifications. Mechanical maladjustment or faults often show their presence t...
Erik Olsson, Peter J. Funk, Marcus Bengtsson
WWW
2005
ACM
16 years 9 days ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...