Sciweavers

7383 search results - page 1435 / 1477
» Theories of information behavior
Sort
View
EDBT
2009
ACM
113views Database» more  EDBT 2009»
15 years 4 months ago
Supporting annotations on relations
Annotations play a key role in understanding and curating databases. Annotations may represent comments, descriptions, lineage information, among several others. Annotation manage...
Mohamed Y. Eltabakh, Walid G. Aref, Ahmed K. Elmag...
ICDCN
2009
Springer
15 years 4 months ago
Byzantine-Resilient Convergence in Oblivious Robot Networks
Given a set of robots with arbitrary initial location and no agreement on a global coordinate system, convergence requires that all robots asymptotically approach the exact same, ...
Zohir Bouzid, Maria Gradinariu Potop-Butucaru, S&e...
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 4 months ago
An exploration of climate data using complex networks
To discover patterns in historical data, climate scientists have applied various clustering methods with the goal of identifying regions that share some common climatological beha...
Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. ...
ICC
2009
IEEE
106views Communications» more  ICC 2009»
15 years 4 months ago
Distributed ECN-Based Congestion Control
—Following the design philosophy of XCP, VCP is a router-assisted congestion protocol that intends to balance the efficiency and the fairness control in high Bandwidth-Delay Pro...
Xiaolong Li, Homayoun Yousefi'zadeh
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
« Prev « First page 1435 / 1477 Last » Next »