Sciweavers

668 search results - page 113 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
ADCS
2004
14 years 11 months ago
Focused Crawling in Depression Portal Search: A Feasibility Study
Previous work on domain specific search services in the area of depressive illness has documented the significant human cost required to setup and maintain closed-crawl parameters....
Thanh Tin Tang, David Hawking, Nick Craswell, Rame...
FAST
2004
14 years 11 months ago
A Versatile and User-Oriented Versioning File System
File versioning is a useful technique for recording a history of changes. Applications of versioning include backups and disaster recovery, as well as monitoring intruders' a...
Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, An...
IC
2004
14 years 11 months ago
An Efficient TCP Buffer Tuning Technique Based on Packet Loss Ratio (TBT-PLR)
The existing TCP (Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high BDP (Bandwidth-Delay Product) because of the fixed small o...
Gi-chul Yoo, Eun-sook Sim, Dongkyun Kim, Taeyoung ...
108
Voted
AAAI
2000
14 years 11 months ago
PROMPT: Algorithm and Tool for Automated Ontology Merging and Alignment
Researchers in the ontology-design field have developed the content for ontologies in many domain areas. Recently, ontologies have become increasingly common on the WorldWide Web ...
Natalya Fridman Noy, Mark A. Musen
CCS
2010
ACM
14 years 10 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...