Results 241 to 250 of about 30,335 (280)
Some of the next articles are maybe not open access.
Crime Event Localization and Deduplication
2020Crime analysis is an approach for identifying patterns and trends in crime events, while information extraction is the task of extracting relevant information from unstructured data. If crime reports are not directly available to the public, a possible solution is to derive crime information published in newspaper articles.
Federica Rollo, Laura Po
openaire +2 more sources
A Dataset for GitHub Repository Deduplication
Proceedings of the 17th International Conference on Mining Software Repositories, 2020GitHub projects can be easily replicated through the site's fork process or through a Git clone-push sequence. This is a problem for empirical software engineering, because it can lead to skewed results or mistrained machine learning models. We provide a dataset of 10.6 million GitHub projects that are copies of others, and link each record with the ...
Diomidis Spinellis +2 more
openaire +2 more sources
Schema Based Deduplication. [PDF]
In this paper we present a preliminary report on a domain independent strategy to reduce duplicated records by means of the knowledge stored in the schema. According to different kinds of relationships, we propose specific techniques to build and compare the knowledge networks by means of graph-based similarity ...
Maurino, A, Li, P
openaire +1 more source
A survey on deduplication systems
International Journal of Grid and Utility Computing, 2023Amdewar Godavari, Chapram Sudhakar
openaire +1 more source
2021
Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use.
Birhade, Bhavesh R. +3 more
openaire +1 more source
Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use.
Birhade, Bhavesh R. +3 more
openaire +1 more source
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
IEEE Transactions on Dependable and Secure Computing, 2023Tao Jiang, Xu Yuan, Ke Cheng
exaly
Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
IEEE Transactions on Services Computing, 2022Qingyuan Xie, Chen Zhang, Xiaohua Jia
exaly
Information Leakage in Encrypted Deduplication via Frequency Analysis
ACM Transactions on Storage, 2020Jingwei Li, Patrick P C Lee
exaly

