Sciweavers

894 search results - page 174 / 179
» A Lightweight Experiment Management System for Handheld Comp...
Sort
View
91
Voted
SIGMETRICS
2002
ACM
14 years 10 months ago
Full-system timing-first simulation
Computer system designers often evaluate future design alternatives with detailed simulators that strive for functional fidelity (to execute relevant workloads) and performance fi...
Carl J. Mauer, Mark D. Hill, David A. Wood
111
Voted
JIDM
2010
160views more  JIDM 2010»
14 years 8 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
97
Voted
ACSAC
2010
IEEE
14 years 8 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
94
Voted
ICDE
2012
IEEE
237views Database» more  ICDE 2012»
13 years 21 days ago
On Discovery of Traveling Companions from Streaming Trajectories
— The advance of object tracking technologies leads to huge volumes of spatio-temporal data collected in the form of trajectory data stream. In this study, we investigate the pro...
Lu An Tang, Yu Zheng, Jing Yuan, Jiawei Han, Alice...
PLDI
2010
ACM
15 years 7 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy