Sciweavers

456 search results - page 91 / 92
» Designing a Metamodel-Based Recommender System
Sort
View
ASPLOS
2006
ACM
13 years 7 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
NSDI
2010
13 years 6 months ago
Volley: Automated Data Placement for Geo-Distributed Cloud Services
: As cloud services grow to span more and more globally distributed datacenters, there is an increasingly urgent need for automated mechanisms to place application data across thes...
Sharad Agarwal, John Dunagan, Navendu Jain, Stefan...
KRMED
2008
13 years 6 months ago
Essential SNOMED: Simplifying SNOMED-CT and supporting Integration with Health Information Models
SNOMED CT (SCT) has been designed and implemented in an era when health computer systems generally required terminology representations in the form of singular precoordinated conc...
Peter MacIsaac, Donald Walker, Rachel L. Richesson...
CORR
2006
Springer
180views Education» more  CORR 2006»
13 years 5 months ago
Social Networks and Social Information Filtering on Digg
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
Kristina Lerman
JSAC
2006
181views more  JSAC 2006»
13 years 5 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu