Suppose you have a Java Server application, and some of the runtime binaries in that application are external to your application. Generated image files, compiled Silverlight components in your pages, or resource files which are managed by an external team. Much like the jar files used by your application, these external binaries can be seen… ·
phantom - Phantom is a high performance proxy for accessing distributed services. It is an RPC system with support for different transports and protocols. Phantom is inspired by Twitter Finagle clients and builds on the capabilities of technologies like Netty, Unix Domain Sockets, Netflix Hystrix and Spring. Phantom proxies have been used to serve hundreds of millions of API calls in production deployments at Flipkart. ·
Eric Garbin, and Inderjeet Mani. Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, page 363--370. Stroudsburg, PA, USA, Association for Computational Linguistics, (2005)
Tamer Elsayed, Jimmy Lin, and Douglas W. Oard. Proceedings of the 46th Annual Meeting of the Association for Computational Linguistics on Human Language Technologies: Short Papers, page 265--268. Stroudsburg, PA, USA, Association for Computational Linguistics, (2008)
Isto Huvila, and Kristin Johannesson. Information Science and Social Media : Proceedings of the International Conference Information Science and Social Media ISSOME 2011, August 24-26, Åbo/Turku, Finland, volume 1 of Skrifter utgivna av Informationsvetenskap vid Åbo Akademi, page 99--106. Åbo Akademi, (2011)
Ralitsa Angelova, and Gerhard Weikum. Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, page 485--492. New York, NY, USA, ACM, (2006)
Anon Plangprasopchok, Kristina Lerman, and Lise Getoor. Proceedings of the 4th ACM Web Search and Data Mining Conference, (2010)cite arxiv:1011.3557Comment: In Proceedings of the 4th ACM Web Search and Data Mining Conference WSDM.