Sciweavers

701 search results - page 17 / 141
» Costs Are Expensive!
Sort
View
JCO
2006
67views more  JCO 2006»
14 years 9 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
PLDI
2010
ACM
15 years 2 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
IEEEARES
2008
IEEE
15 years 3 months ago
On the Possibility of Small, Service-Free Disk Based Storage Systems
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...
Jehan-François Pâris, Thomas J. E. Sc...
72
Voted
AIPS
1996
14 years 10 months ago
Static and Completion Analysis for Planning Knowledge Base Development and Verification
A key obstacle hampering fielding of AI planning applications is the considerable expense of developing, verifying, updating, and maintaining the planning knowledge base (KB). Pla...
Steve A. Chien
CORR
2010
Springer
215views Education» more  CORR 2010»
14 years 9 months ago
Text Classification using the Concept of Association Rule of Data Mining
As the amount of online text increases, the demand for text classification to aid the analysis and management of text is increasing. Text is cheap, but information, in the form of...
Chowdhury Mofizur Rahman, Ferdous Ahmed Sohel, Par...