Sciweavers

1659 search results - page 273 / 332
» Modeling Customizable Web Applications
Sort
View
DASFAA
2010
IEEE
191views Database» more  DASFAA 2010»
14 years 10 months ago
Answering Top-k Similar Region Queries
Abstract. Advances in web technology have given rise to new information retrieval applications. In this paper, we present a model for geographical region search and call this class...
Chang Sheng, Yu Zheng, Wynne Hsu, Mong-Li Lee, Xin...
TON
2010
68views more  TON 2010»
14 years 8 months ago
Upgrading mice to elephants: effects and end-point solutions
Abstract— Short TCP flows may suffer significant responsetime performance degradations during network congestion. Unfortunately, this creates an incentive for misbehavior by cl...
Amit Mondal, Aleksandar Kuzmanovic
EUROSYS
2008
ACM
15 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
ASPLOS
2010
ACM
15 years 4 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 3 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...