Sciweavers

72 search results - page 9 / 15
» SPM management using Markov chain based data access predicti...
Sort
View
SACMAT
2010
ACM
15 years 1 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
81
Voted
DSN
2007
IEEE
15 years 3 months ago
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services
New versions of existing large-scale web services such as Passport.com© have to go through rigorous performance evaluations in order to ensure a high degree of availability. Perf...
Marcelo De Barros, Jing Shiau, Chen Shang, Kenton ...
ITIIS
2008
151views more  ITIIS 2008»
14 years 9 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
KDD
2006
ACM
253views Data Mining» more  KDD 2006»
15 years 10 months ago
Adaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visi...
Justin Brickell, Inderjit S. Dhillon, Dharmendra S...
65
Voted
WWW
2004
ACM
15 years 10 months ago
Type based service composition
Service matchmaking and composition has recently drawn increasing attention in the research community. Most existing algorithms construct chains of services based on exact matches...
Ion Constantinescu, Boi Faltings, Walter Binder