A survey of rollback-recovery protocols in message-passing systems
EN Elnozahy, L Alvisi, YM Wang… - ACM Computing Surveys …, 2002 - dl.acm.org
This survey covers rollback-recovery techniques that do not require special language
constructs. In the first part of the survey we classify rollback-recovery protocols into checkpoint-…
constructs. In the first part of the survey we classify rollback-recovery protocols into checkpoint-…
Statistical identification of encrypted web browsing traffic
Q Sun, DR Simon, YM Wang, W Russell… - … IEEE Symposium on …, 2002 - ieeexplore.ieee.org
Encryption is often proposed as a tool for protecting the privacy of World Wide Web browsing.
However, encryption-particularly as typically implemented in, or in concert with popular …
However, encryption-particularly as typically implemented in, or in concert with popular …
Fine-grained power modeling for smartphones using system call tracing
Accurate, fine-grained online energy estimation and accounting of mobile devices such as
smartphones is of critical importance to understanding and debugging the energy …
smartphones is of critical importance to understanding and debugging the energy …
Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks
The topology of a wireless multi-hop network can be controlled by varying the transmission
power at each node. In this paper, we give a detailed analysis of a cone-based distributed …
power at each node. In this paper, we give a detailed analysis of a cone-based distributed …
Quantum-chemical predictions of absolute standard redox potentials of diverse organic molecules and free radicals in acetonitrile
Y Fu, L Liu, HZ Yu, YM Wang… - Journal of the American …, 2005 - ACS Publications
A calibrated B3LYP/6-311++G(2df,2p)//B3LYP/6-31+G(d) method was found to be able to
predict the gas-phase adiabatic ionization potentials of 160 structurally unrelated organic …
predict the gas-phase adiabatic ionization potentials of 160 structurally unrelated organic …
A cone-based distributed topology-control algorithm for wireless multi-hop networks
The topology of a wireless multi-hop network can be controlled by varying the transmission
power at each node. In this paper, we give a detailed analysis of a cone-based distributed …
power at each node. In this paper, we give a detailed analysis of a cone-based distributed …
Efficient multiple-click models in web search
F Guo, C Liu, YM Wang - Proceedings of the second acm international …, 2009 - dl.acm.org
Many tasks that leverage web search users' implicit feedback rely on a proper and unbiased
interpretation of user clicks. Previous eye-tracking experiments and studies on explaining …
interpretation of user clicks. Previous eye-tracking experiments and studies on explaining …
Model comparisons and model selections based on generalization criterion methodology
JR Busemeyer, YM Wang - Journal of Mathematical Psychology, 2000 - Elsevier
The purpose of this article is to formalize the generalization criterion method for model
comparison. The method has the potential to provide powerful comparisons of complex and …
comparison. The method has the potential to provide powerful comparisons of complex and …
[PDF][PDF] Automatic Misconfiguration Troubleshooting with PeerPressure.
Technical support contributes 17% of the total cost of ownership of today’s desktop PCs [25].
An important element of technical support is troubleshooting misconfigured applications. …
An important element of technical support is troubleshooting misconfigured applications. …
Click chain model in web search
Given a terabyte click log, can we build an efficient and effective click model? It is commonly
believed that web search click logs are a gold mine for search business, because they …
believed that web search click logs are a gold mine for search business, because they …