Sciweavers

36 search results - page 6 / 8
» Characterizing instant messaging from recorded logs
Sort
View
122
Voted
MMB
2004
Springer
149views Communications» more  MMB 2004»
15 years 7 months ago
Relating Query Popularity and File Replication in the Gnutella Peer-to-Peer Network
In this paper, we characterize the user behavior in a peer-to-peer (P2P) file sharing network. Our characterization is based on the results of an extensive passive measurement stu...
Alexander Klemm, Christoph Lindemann, Oliver P. Wa...
ICSM
2007
IEEE
15 years 8 months ago
Release Pattern Discovery: A Case Study of Database Systems
Studying the release-time activities of a software project — that is, activities that occur around the time of a major or minor release — can provide insights into both the de...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
16 years 3 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
JDWM
2010
139views more  JDWM 2010»
15 years 7 days ago
Mining Frequent Generalized Patterns for Web Personalization in the Presence of Taxonomies
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usagebased approach to generate recommendations that ...
Panagiotis Giannikopoulos, Iraklis Varlamis, Magda...
CORR
2010
Springer
70views Education» more  CORR 2010»
15 years 1 months ago
Simultaneous communication in noisy channels
A sender wishes to broadcast a message of length n over an alphabet of size k to r users, where each user i, 1 i r should be able to receive one of possible mi messages. The cha...
Amit Weinstein