Sciweavers

21342 search results - page 3750 / 4269
» A Structured Language Model
Sort
View
CCS
2011
ACM
14 years 4 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
163
Voted
CIKM
2011
Springer
14 years 4 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...
ISSTA
2012
ACM
13 years 7 months ago
Cooperative types for controlling thread interference in Java
Multithreaded programs are notoriously prone to unintended interference between concurrent threads. To address this problem, we argue that yield annotations in the source code sho...
Jaeheon Yi, Tim Disney, Stephen N. Freund, Cormac ...
GIS
2009
ACM
16 years 5 months ago
Web 2.0 Geospatial Visual Analytics for Improved Urban Flooding Situational Awareness and Assessment
Situational awareness of urban flooding during storm events is important for disaster and emergency management. However, no general purpose tools yet exist for rendering rainfall ...
Alejandro Rodríguez, David Hill, Jim Myers,...
SIGSOFT
2008
ACM
16 years 5 months ago
Inter-context control-flow and data-flow test adequacy criteria for nesC applications
NesC is a programming language for applications that run on top of networked sensor nodes. Such an application mainly uses an interrupt to trigger a sequence of operations, known ...
Zhifeng Lai, Shing-Chi Cheung, Wing Kwong Chan
« Prev « First page 3750 / 4269 Last » Next »