Sciweavers

1744 search results - page 226 / 349
» A Proof-Carrying File System
Sort
View
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 9 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
EUROPAR
2006
Springer
15 years 8 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
ICS
2010
Tsinghua U.
15 years 7 months ago
InterferenceRemoval: removing interference of disk access for MPI programs through data replication
As the number of I/O-intensive MPI programs becomes increasingly large, many efforts have been made to improve I/O performance, on both software and architecture sides. On the sof...
Xuechen Zhang, Song Jiang
CCS
2008
ACM
15 years 6 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
EDM
2010
248views Data Mining» more  EDM 2010»
15 years 6 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...