Sciweavers

502 search results - page 98 / 101
» Hybrid Approaches for Distributed Storage Systems
Sort
View
116
Voted
TDSC
2010
218views more  TDSC 2010»
14 years 8 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
104
Voted
STOC
2004
ACM
145views Algorithms» more  STOC 2004»
15 years 10 months ago
Using mixture models for collaborative filtering
A collaborative filtering system at an e-commerce site or similar service uses data about aggregate user behavior to make recommendations tailored to specific user interests. We d...
Jon M. Kleinberg, Mark Sandler
85
Voted
EUROSYS
2008
ACM
15 years 7 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
CIKM
2009
Springer
15 years 4 months ago
Personalized social search based on the user's social network
This work investigates personalized social search based on the user’s social relations – search results are re-ranked according to their relations with individuals in the user...
David Carmel, Naama Zwerdling, Ido Guy, Shila Ofek...
94
Voted
JSSPP
2005
Springer
15 years 3 months ago
AnthillSched: A Scheduling Strategy for Irregular and Iterative I/O-Intensive Parallel Jobs
Irregular and iterative I/O-intensive jobs need a different approach from parallel job schedulers. The focus in this case is not only the processing requirements anymore: memory, ...
Luís Fabrício Wanderley Góes,...