Sciweavers

648 search results - page 99 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
ICPP
2009
IEEE
15 years 2 months ago
Mediacoop: Hierarchical Lookup for P2P-VoD Services
The random seeking in P2P-VoD system requires efficient lookup for "good" suppliers. The main challenge is that good suppliers should meet two requirements: "conten...
Tieying Zhang, Jianming Lv, Xueqi Cheng
SIGMETRICS
2010
ACM
113views Hardware» more  SIGMETRICS 2010»
14 years 11 months ago
Reliability analysis of deduplicated and erasure-coded storage
Space efficiency and data reliability are two primary concerns for modern storage systems. Chunk-based deduplication, which breaks up data objects into single-instance chunks that...
Xiaozhou Li, Mark Lillibridge, Mustafa Uysal
JCST
2011
89views more  JCST 2011»
15 years 12 hour ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
151
Voted
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 11 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 11 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communities...
Karine Barzilai-Nahon