Sciweavers

528 search results - page 18 / 106
» Introducing records by refactoring
Sort
View
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 3 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
ICMCS
2000
IEEE
126views Multimedia» more  ICMCS 2000»
15 years 2 months ago
A Cooperative Playback System for On-Demand Multimedia Sessions over Internet
IP multicast has fueled an assortment of large-scale applications over the Internet ranging from interactive video conferencing to whiteboards to video recording on-demand systems...
Giancarlo Fortino, Libero Nigro
ERCIMDL
2007
Springer
114views Education» more  ERCIMDL 2007»
15 years 1 months ago
Key Element-Context Model: An Approach to Efficient Web Metadata Maintenance
In this paper, we study the problem of maintaining metadata for open Web content. In digital libraries such as DLESE, NSDL and G-Portal, metadata records are created for some good ...
Ba-Quy Vuong, Ee-Peng Lim, Aixin Sun, Chew-Hung Ch...
ISCAPDCS
2003
14 years 11 months ago
N-Tuple Compression: A Novel Method for Compression of Branch Instruction Traces
Branch predictors and processor front-ends have been the focus of a number of computer architecture studies. Typically they are evaluated separately from other components using tr...
Aleksandar Milenkovic, Milena Milenkovic, Jeffrey ...
SAC
2005
ACM
15 years 3 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon