• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 32
Next 10 →

Abstract

by Panagiotis G. Ipeirotis, Eugene Agichtein, Luis Gravano, Pranay Jain , 2006
"... Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive structured relations from unstructured text; as another example, focused crawlers explore the web to locate pages about ..."
Abstract - Add to MetaCart
specific topics. Execution plans for text-centric tasks follow two general paradigms for processing a text database: either we can scan, or “crawl, ” the text database or, alternatively, we can exploit search engine indexes and retrieve the documents of interest via carefully crafted queries constructed

POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR

by Dominique Tschopp, Prof E. Telatar, Prof S. Diggavi, Prof M. Grossglauser, Prof J. -y, Le Boudec, Prof M. Mitzenmacher, Prof S. Shakkottai
"... 2010 to my wife, Joyce, and my family...- Résumé- ..."
Abstract - Add to MetaCart
2010 to my wife, Joyce, and my family...- Résumé-

Query Evaluation with Constant Delay

by Thèse De Doctorat, Normale Supérieure, De Cachan, Présentée Par, Monsieur Wojciech Kazana, Docteur De, Supérieure De Cachan, Nicole Bidoit, Professeur Président, Arnaud Durand, Patrice Ossona, Mendez Chargé, Victor Vianu, Professeur Examinateur, Luc Segoufin, Directeur Recherche Directeur
"... I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available for dis ..."
Abstract - Add to MetaCart
I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available for discussions and advice. I would like to thank Arnaud Durand and Patrice Ossona de Mendez for accepting to review this thesis and for their constructive comments on the earlier versions of this manuscript. Many thanks to Nicole Bidoit and Victor Vianu for accepting to be in my jury. Special thanks go to my Parents, who directed me to follow the scientific path and where fully supportive at all times. Thanks to all the members of LSV – it was a pleasure working with You. I would like to thank the awesome people whom I have been working with in the same office on the 4th floor. Without all the nice riddles and the magnificent French lessons my time there wouldn’t be as chouette as it was. Big thanks go to my son Boris, who was kind enough to sleep through the whole nights, allowing his dad to actually write the thesis down.

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

IN INTELLIGENCE INFORMATION SYSTEM1

by Jugoslav Achkoski, Vladimir Trajkovik
"... Summary: This paper presents the model of Intelligence Information System (IIS) based on a Service-Oriented Architecture. In this paper we propose the new service’s model, based on the Intelligence cycle and other systems which are necessary for gathering intelligence information and data. The paper ..."
Abstract - Add to MetaCart
Summary: This paper presents the model of Intelligence Information System (IIS) based on a Service-Oriented Architecture. In this paper we propose the new service’s model, based on the Intelligence cycle and other systems which are necessary for gathering intelligence information and data. The paper is mostly focused on the system architecture and services design as a mainstream for definition of the services. Furthermore, additional attention is dedicated on the Distributed System Reliability (DSR).

Service Design and Distributed System Reliability in Intelligence Information System Based on Service-Oriented Architecture

by unknown authors
"... Abstract—This paper presents the model of Intelligence Information System (IIS) based on a Service-Oriented Architecture. In this paper we propose the new service’s model, based on the Intelligence cycle and other systems which are necessary for gathering Intelligence information and data. The pape ..."
Abstract - Add to MetaCart
Abstract—This paper presents the model of Intelligence Information System (IIS) based on a Service-Oriented Architecture. In this paper we propose the new service’s model, based on the Intelligence cycle and other systems which are necessary for gathering Intelligence information and data. The paper is mostly focused on the system architecture and services design as a mainstream for definition of the services. Furthermore, additional attention is dedicated on the

Defense Against the Dark Arts

by unknown authors
"... Computer science faculty must attract and retain students by offer-ing innovative courses that spark student interest, yet still teach core, computer science concepts. These efforts have become par-ticularly important as computer science enrollments have declined, thus increasing concerns for attrac ..."
Abstract - Add to MetaCart
Computer science faculty must attract and retain students by offer-ing innovative courses that spark student interest, yet still teach core, computer science concepts. These efforts have become par-ticularly important as computer science enrollments have declined, thus increasing concerns for attracting and retaining students. We describe an innovative course that leverages students ’ interest in computer security issues to attract and retain technically-oriented students. Our initial vision was to offer a course covering computer viruses—a subject that even a novice computer user has some familiarity. To avoid the controversy associated with teaching stu-dents how to write malicious software, we focused the course on techniques for defending against viruses, so we named the course Defense Against the Dark Arts. In teaching the course, we have found the subject matter provides an engaging way to introduce and reinforce many important computer science concepts that other courses often cover, most particularly, the traditional com-piler course. We have taught the course three times at two separate institutions, with a third school soon to follow. The course has been well received by students—completely filling each semester with enrollments that are four to five times greater than the com-piler course. Furthermore, student surveys indicate that the course raises students ’ awareness of computer security while introducing students to important program translation and analysis concepts.

J2EE Performance and Scalability- From Measuring to Predicting

by unknown authors
"... Abstract — J2EE applications are becoming increasingly ubiquitous and with their increasing adoption, performance and scalability issues are gaining in importance. For a J2EE application to perform well and be scalable, both the platform on which it is built and the application design must be effici ..."
Abstract - Add to MetaCart
Abstract — J2EE applications are becoming increasingly ubiquitous and with their increasing adoption, performance and scalability issues are gaining in importance. For a J2EE application to perform well and be scalable, both the platform on which it is built and the application design must be efficient and scalable. Industry-standard benchmarks such as the SPECjAppServer set of benchmarks help to evaluate the performance and scalability of alternative platforms for J2EE applications, however, they cannot be used to evaluate the performance and scalability of concrete applications built on the selected platforms. In this paper, we present a systematic approach for evaluating and predicting the performance and scalability of J2EE applications based on modeling and simulation. The approach helps to identify and eliminate bottlenecks in the application design and ensure that systems are designed and sized to meet their quality of service requirements. We introduce our approach by showing how it can be applied to the SPECjAppServer2004 benchmark which is used as a representative J2EE application. A detailed model of a SPECjAppServer2004 deployment is built in a step-by-step fashion and then used to predict the behavior of the system under load. The approach is validated by comparing model predictions against measurements on the real system. Index Terms — Performance modeling and prediction, software verification, performance evaluation, distributed systems

von

by Mathematisch-naturwissenschaftlichen Fakultät, Stefan Lange, Prof Dr, Jan-hendrik Olbertz, Prof Dr, Elmar Kulke
"... eingereicht an der ..."
Abstract - Add to MetaCart
eingereicht an der

Wireless Sensor Networking in Challenging Environments

by Mo Sha, Raj Jain, Jonathan Turner, Guoliang Xing, Mo Sha , 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract - Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact
Next 10 →
Results 11 - 20 of 32
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University