Sciweavers

2058 search results - page 327 / 412
» Concast: Design and Implementation of a New Network Service
Sort
View
OSDI
2006
ACM
16 years 4 days ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
PVLDB
2011
14 years 6 months ago
Column-Oriented Storage Techniques for MapReduce
Users of MapReduce often run into performance problems when they scale up their workloads. Many of the problems they encounter can be overcome by applying techniques learned from ...
Avrilia Floratou, Jignesh M. Patel, Eugene J. Shek...

Publication
191views
16 years 10 months ago
ERICA Switch Algorithm: A Complete Description
The ERICA switch algorithm has been discussed extensively in TM group in the past. However, over the last two years, the algorithm has been substantially modified. This contributio...
Raj Jain, Shiv Kalyanaraman, Rohit, Goyal, Sonia F...
ICPR
2008
IEEE
15 years 6 months ago
A supervised learning approach for imbalanced data sets
This paper presents a new learning approach for pattern classification applications involving imbalanced data sets. In this approach, a clustering technique is employed to resamp...
Giang Hoang Nguyen, Abdesselam Bouzerdoum, Son Lam...
WCNC
2008
IEEE
15 years 6 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper