Sciweavers

828 search results - page 138 / 166
» A framework for spyware assessment
Sort
View
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 7 months ago
Prototype Implementations of an Architectural Model for Service-Based Flexible Software
The need to change software easily to meet evolving business requirements is urgent, and a radical shift is required in the development of software, with a more demand-centric vie...
Keith H. Bennett, Malcolm Munro, Jie Xu, Nicolas G...
IEEEPACT
2002
IEEE
15 years 7 months ago
Application Transformations for Energy and Performance-Aware Device Management
Energy conservation without performance degradation is an important goal for battery-operated computers, such as laptops and hand-held assistants. In this paper we determine the p...
Taliver Heath, Eduardo Pinheiro, Jerry Hom, Ulrich...
PARELEC
2002
IEEE
15 years 6 months ago
Dynamic Process Partitioning and Migration for Irregular Applications
Many practical applications generate irregular, nonbalanced divide-and-conquer trees which have different depths, possibly also different numbers of successors at different levels...
Pawel Czarnul
CSE
2009
IEEE
15 years 6 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu
WIKIS
2009
ACM
15 years 6 months ago
Evaluating the trustworthiness of Wikipedia articles through quality and credibility
Wikipedia has become a very popular destination for Web surfers seeking knowledge about a wide variety of subjects. While it contains many helpful articles with accurate informati...
Sai T. Moturu, Huan Liu