Sciweavers

274 search results - page 55 / 55
» The Design, Implementation and Operation of an Email Pseudon...
Sort
View
IUI
2004
ACM
13 years 10 months ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
13 years 9 months ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
CCS
2008
ACM
13 years 6 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
JFP
2010
107views more  JFP 2010»
13 years 3 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan