Database Reference
In-Depth Information
26. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O.,
Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A.,
Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine
learning in Python. JMLR 12 , 2825-2830 (2011)
27. Shen, H.: An ecient and adaptive decentralized file replication algorithm in P2P
file sharing systems. IEEE Trans. Parallel Distrib. Syst. 21 , 827-840 (2010)
28. Silvestre, G., Fernandes, S., Kamienski, C., Sadok, D.: Most wanted internet appli-
cations: a framework for P2P identification. In: CNSR (2010)
29. Silvestre, G., Monnet, S., Krishnaswamy, R., Sens, P.: Aren: a popularity aware
replication scheme for cloud storage. In: ICPADS (2012)
30. Silvestre, G., Monnet, S., Krishnaswamy, R., Sens, P.: Caju: a content distribution
system for edge networks. Technical report, UPMC Sorbone Universites (2012)
31. Steinwart, I.: How to Compare different loss functions and their risks. Constr.
Approx. 26 , 225-287 (2007)
32. Bittorrent. http://bittorrent.com
33. Szabo, G., Huberman, B.A.: Predicting the popularity of online content. Commun.
ACM 53 , 80-88 (2010)
34. Wilson, C., Ballani, H., Karagiannis, T., Rowstron, A.: Better never than late:
meeting deadlines in datacenter networks. In: SIGCOMM (2011)
35. Zhang, T.: Statistical behavior and consistency of classification methods based on
convex risk minimization. Ann. Stat. 32 (1), 56-134 (2004)
Search WWH ::




Custom Search