Sciweavers

10909 search results - page 24 / 2182
» Evaluating Backup Algorithms
Sort
View
IDEAS
1997
IEEE
110views Database» more  IDEAS 1997»
15 years 1 months ago
Accommodating Logical Logging under Fuzzy Checkpointing in Main Memory Databases
This paper presents a simple and effective method to reduce the size of log data for recovery in main memory databases. Fuzzy checkpointing is known to be very efficient in main ...
Seung-Kyoon Woo, Myoung-Ho Kim, Yoon-Joon Lee
SSS
2010
Springer
143views Control Systems» more  SSS 2010»
14 years 7 months ago
Lightweight Live Migration for High Availability Cluster Service
High availability is a critical feature for service clusters and cloud computing, and is often considered more valuable than performance. One commonly used technique to enhance the...
Bo Jiang, Binoy Ravindran, Changsoo Kim
FAST
2009
14 years 7 months ago
Smoke and Mirrors: Reflecting Files at a Geographically Remote Location Without Loss of Performance
The Smoke and Mirrors File System (SMFS) mirrors files at geographically remote datacenter locations with negligible impact on file system performance at the primary site, and min...
Hakim Weatherspoon, Lakshmi Ganesh, Tudor Marian, ...
SIGIR
2012
ACM
12 years 12 months ago
An uncertainty-aware query selection model for evaluation of IR systems
We propose a mathematical framework for query selection as a mechanism for reducing the cost of constructing information retrieval test collections. In particular, our mathematica...
Mehdi Hosseini, Ingemar J. Cox, Natasa Milic-Frayl...
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
15 years 4 months ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...