Sciweavers

2747 search results - page 234 / 550
» Network externalities in software systems
Sort
View
103
Voted
CLEF
2010
Springer
15 years 1 months ago
A Cluster-Based Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
Du Zou, Wei-jiang Long, Zhang Ling
SDM
2012
SIAM
294views Data Mining» more  SDM 2012»
13 years 3 months ago
Kernelized Probabilistic Matrix Factorization: Exploiting Graphs and Side Information
We propose a new matrix completion algorithm— Kernelized Probabilistic Matrix Factorization (KPMF), which effectively incorporates external side information into the matrix fac...
Tinghui Zhou, Hanhuai Shan, Arindam Banerjee, Guil...
102
Voted
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 6 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
114
Voted
CORR
2011
Springer
128views Education» more  CORR 2011»
14 years 7 months ago
Load Balancing in a Networked Environment through Homogenization
Distributed processing across a networked environment suffers from unpredictable behavior of speedup due to heterogeneous nature of the hardware and software in the remote machine...
M. Shahriar Hossain, M. Muztaba Fuad, Debzani Deb,...
133
Voted
ICDE
2007
IEEE
169views Database» more  ICDE 2007»
15 years 4 months ago
Semantic Web Services Composition: A Network Analysis Approach
"Software as a service" approach has become a reality since efforts of both industry and research focused on service integration on the web. It would be possible to see ...
Gokay Burak Akkus