منابع مشابه
File Clustering using Forensic Analysis System
In this paper computer forensic analysis investigation, thousands of files are generally surveyed. In this much of the data in those files consists of formless manuscript, whose investigation by computer examiners is very tough to accomplish. Clustering is the unverified organization of designs that is data items, remarks, or feature vectors into groups (clusters). To find a noble clarification...
متن کاملClustering the Reliable File Transfer Service
As grids move from prototypes to testbeds to production infrastructure, grid resource providers are faced with the challenge of delivering reliable services to enable productive use of available resources. On high performance, distributed grids such as the TeraGrid, moving large data sets to, from, and between supercomputing resources requires reliable data management services. The Reliable Fil...
متن کاملOntology-Based File Naming Through Hierarchical Conceptual Clustering
Current directory-based hierarchical file systems have many limitations as the amount of unstructured data possessed by individual user is increasing continuously. One of the most significant problems is that users usually have difficulties searching, navigating, and organizing their files since useful semantic information describing a file is not used in the current directory-based system. To ...
متن کاملAn Analysis of File Space Properties Using Clustering
Clustering is a technique used in information retrieval to improve both search quality and response time. This latter is achieved through the placing of similar documents/records close together in the file space which in turn has the effect of reducing the total number of block transfers needed to retrieve a given record set. A file space which has been restructured in this way may be regarded ...
متن کاملClustering in Peer-to-Peer File Sharing Workloads
Peer-to-peer file sharing systems now generate a significant portion of Internet traffic. A good understanding of their workloads is crucial in order to improve their scalability, robustness and performance. Previous measurement studies on Kazaa and Gnutella were based on monitoring peer requests, and mostly concerned with peer and file availability and network traffic. In this paper, we take d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Compiler
سال: 2015
ISSN: 2549-2403,2252-3839
DOI: 10.28989/compiler.v4i2.90