Sciweavers

323 search results - page 63 / 65
» Alert Detection in System Logs
Sort
View
98
Voted
IUI
2006
ACM
15 years 6 months ago
SWISH: semantic analysis of window titles and switching history
Information workers are often involved in multiple tasks and activities that they must perform in parallel or in rapid succession. In consequence, task management itself becomes y...
Nuria Oliver, Greg Smith, Chintan Thakkar, Arun C....
100
Voted
WWW
2009
ACM
16 years 1 months ago
Discovering users' specific geo intention in web search
Discovering users' specific and implicit geographic intention in web search can greatly help satisfy users' information needs. We build a geo intent analysis system that...
Xing Yi, Hema Raghavan, Chris Leggetter
118
Voted
GRID
2005
Springer
15 years 6 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
151
Voted
SIGCOMM
2004
ACM
15 years 6 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
102
Voted
EDBT
2000
ACM
15 years 4 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...