Sciweavers

10909 search results - page 1971 / 2182
» Evaluating Backup Algorithms
Sort
View
144
Voted
HPDC
2010
IEEE
15 years 5 months ago
Cluster-wide context switch of virtualized jobs
Clusters are mostly used through Resources Management Systems (RMS) with a static allocation of resources for a bounded amount of time. Those approaches are known to be insufficie...
Fabien Hermenier, Adrien Lebre, Jean-Marc Menaud
SIGMETRICS
2010
ACM
217views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Optimal recovery of single disk failure in RDP code storage systems
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...
SIGMOD
2010
ACM
201views Database» more  SIGMOD 2010»
15 years 5 months ago
I4E: interactive investigation of iterative information extraction
Information extraction systems are increasingly being used to mine structured information from unstructured text documents. A commonly used unsupervised technique is to build iter...
Anish Das Sarma, Alpa Jain, Divesh Srivastava
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 5 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
135
Voted
SIGMOD
2010
ACM
191views Database» more  SIGMOD 2010»
15 years 5 months ago
Data conflict resolution using trust mappings
In massively collaborative projects such as scientific or community databases, users often need to agree or disagree on the content of individual data items. On the other hand, tr...
Wolfgang Gatterbauer, Dan Suciu
« Prev « First page 1971 / 2182 Last » Next »