Sciweavers

1122 search results - page 138 / 225
» Information Retrieval in Network Administration
Sort
View
93
Voted
ACISICIS
2009
IEEE
15 years 6 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
81
Voted
ICTIR
2009
Springer
15 years 6 months ago
A New Measure of the Cluster Hypothesis
Abstract. We have found that the nearest neighbor (NN) test is an insufficient measure of the cluster hypothesis. The NN test is a local measure of the cluster hypothesis. Designer...
Mark D. Smucker, James Allan
89
Voted
JCDL
2006
ACM
152views Education» more  JCDL 2006»
15 years 5 months ago
Also by the same author: AKTiveAuthor, a citation graph approach to name disambiguation
The desire for definitive data and the semantic web drive for inference over heterogeneous data sources requires co-reference resolution to be performed on those data. In particul...
Duncan M. McRae-Spencer, Nigel R. Shadbolt
IPSN
2004
Springer
15 years 5 months ago
Entropy-based sensor selection heuristic for target localization
We propose an entropy-based sensor selection heuristic for localization. Given 1) a prior probability distribution of the target location, and 2) the locations and the sensing mod...
Hanbiao Wang, Kung Yao, Gregory J. Pottie, Deborah...
CIKM
1998
Springer
15 years 3 months ago
Continual Computation Policies for Utility-Directed Prefetching
People accessing documents via the Internet typically experience latencies in retrieving content. We discuss continual-computation policies that dictate strategies for prefetching...
Eric Horvitz