Sciweavers

807 search results - page 96 / 162
» Deploying and evaluating a location-aware system
Sort
View
ICSM
2009
IEEE
15 years 4 months ago
Prioritizing component compatibility tests via user preferences
Many software systems rely on third-party components during their build process. Because the components are constantly evolving, quality assurance demands that developers perform ...
Il-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A....
VLDB
2004
ACM
173views Database» more  VLDB 2004»
15 years 3 months ago
Enhancing P2P File-Sharing with an Internet-Scale Query Processor
In this paper, we address the problem of designing a scalable, accurate query processor for peerto-peer filesharing and similar distributed keyword search systems. Using a global...
Boon Thau Loo, Joseph M. Hellerstein, Ryan Huebsch...
CORR
2002
Springer
93views Education» more  CORR 2002»
14 years 9 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
13 years 5 months ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani
NSDI
2007
15 years 4 days ago
WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks
WiFi-based Long Distance (WiLD) networks with links as long as 50–100 km have the potential to provide connectivity at substantially lower costs than traditional approaches. How...
Rabin K. Patra, Sergiu Nedevschi, Sonesh Surana, A...