Sciweavers

18697 search results - page 3737 / 3740
» Systemic Security Management
Sort
View
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 7 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
ICDE
2012
IEEE
199views Database» more  ICDE 2012»
13 years 2 months ago
Physically Independent Stream Merging
—A facility for merging equivalent data streams can support multiple capabilities in a data stream management system (DSMS), such as query-plan switching and high availability. O...
Badrish Chandramouli, David Maier, Jonathan Goldst...
KDD
2012
ACM
247views Data Mining» more  KDD 2012»
13 years 2 months ago
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks
Real-world, multiple-typed objects are often interconnected, forming heterogeneous information networks. A major challenge for link-based clustering in such networks is its potent...
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan...
ICDCS
2012
IEEE
13 years 2 months ago
eTransform: Transforming Enterprise Data Centers by Automated Consolidation
Abstract—Modern day enterprises have a large IT infrastructure comprising thousands of applications running on servers housed in tens of data centers geographically spread out. T...
Rahul Singh, Prashant J. Shenoy, K. K. Ramakrishna...
ICDCS
2012
IEEE
13 years 2 months ago
G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications
—With users increasingly focused on an online world, an emerging challenge for the network infrastructure is the need to support Massively Multiplayer Online Role Playing Games (...
Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, K...
« Prev « First page 3737 / 3740 Last » Next »