Sciweavers

1426 search results - page 283 / 286
» Analyzing Web Service Based Business Processes
Sort
View
FAST
2007
15 years 1 months ago
Disk Failures in the Real World: What Does an MTTF of 1, 000, 000 Hours Mean to You?
Component failure in large-scale IT installations is becoming an ever larger problem as the number of components in a single cluster approaches a million. In this paper, we presen...
Bianca Schroeder, Garth A. Gibson
WWW
2007
ACM
16 years 9 days ago
A large-scale evaluation and analysis of personalized search strategies
Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistent...
Zhicheng Dou, Ruihua Song, Ji-Rong Wen
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
15 years 11 months ago
To search or to crawl?: towards a query optimizer for text-centric tasks
Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive...
Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay ...
BMCBI
2008
122views more  BMCBI 2008»
14 years 11 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 2 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu