Error message

The page you requested does not exist. For your convenience, a search was performed using the query content.

Page not found

Search results

  1. Exploiting Social Media Sources for Search, Fusion and Evaluation

    ... via different media. Social media, as one of the largest content carriers, has generated information from millions of users ... information network , to associate related web and social content, where information sources of diverse characteristics can be used to ...

  2. Recent Computer Science Ph.D. Graduates (AY 2011 - 2012)

    ... considers the opposite problem: predicting the textual content of documents based on non-text data. In this work, I study several ... influence of specific metadata elements in determining the content of text documents. Such topic regression methods allow users of ...

  3. Analysis of Student Learning in High Enrollment Computer-based College Courses

    ... Since an LMS can record student interactions with a course's content, we have an opportunity as never before to analyze student behavior in ... to courses in any STEM discipline using an LMS with content components similar to the introductory courses we studied. These ...

  4. UMass team wins Juniper/Comcast Hackathon first prize

    ... introduction to large-scale service provider content distribution networking. After two days, this workshop was followed ... The crux of the problem statement was to build an efficient content transport and monitoring system for a constrained legacy network ...

  5. Ph.D. Dissertation Proposal Defense- Chang Liu

    ... our daily communication, delivering huge amount of content and large number of services, and providing large scale distributed ... aspects. In the context of mapping users to servers in content delivery networks, we show that letting user select a server that ...

  6. A data-driven approach to researching censorship and sensitive conversations on social media

    ... a corresponding rise in the filtering and blocking of online content in China. Identifying and explaining these disruptions comes with a ... not only academic researchers who hope to better understand content moderation and filtering practices, but it is essential information for ...

  7. Handling the Facebook Avalanche

    ... piece of hardware. Moreover, annotating user-contributed content as from "a friend of a friend" offers many more opportunities to de-anonymize content than using only the first-degree friend network.  We'll talk about ...

  8. Software Engineer/Programmer, OneReport (Brattleboro, VT)

    ... policies and practices Public website development and content management Key Skills & Qualifications: High ... experience (potentially including website builders and content management systems) Familiarity with and interest in corporate ...

  9. Sharing-Aware Algorithms for Virtual Machine Colocation

    ... physical server can share memory pages that have identical content, thereby reducing the overall memory requirements on the server. We ... algorithms that can colocate VMs with similar page content on the same physical server to optimize the benefits of inter-VM ...

  10. Greening Internet-Scale Distributed Networks Using Renewables

    ... centers around the world. A canonical example of an IDN is a content delivery network (CDN) that delivers content to users from a large global deployment of servers around the world. ...

Pages