Sciweavers

21430 search results - page 4148 / 4286
» Abstract Effective Models
Sort
View
122
Voted
USENIX
2008
15 years 5 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
124
Voted
ACMACE
2008
ACM
15 years 5 months ago
Dimensionality reduced HRTFs: a comparative study
Dimensionality reduction is a statistical tool commonly used to map high-dimensional data into lower a dimensionality. The transformed data is typically more suitable for regressi...
Bill Kapralos, Nathan Mekuz, Agnieszka Kopinska, S...
160
Voted
ASPLOS
2008
ACM
15 years 5 months ago
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires adva...
Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou
157
Voted
ASPLOS
2008
ACM
15 years 5 months ago
Communication optimizations for global multi-threaded instruction scheduling
The recent shift in the industry towards chip multiprocessor (CMP) designs has brought the need for multi-threaded applications to mainstream computing. As observed in several lim...
Guilherme Ottoni, David I. August
ATAL
2008
Springer
15 years 5 months ago
Engineering large-scale distributed auctions
The functional characteristics of market-based solutions are typically best observed through the medium of simulation, data-gathering and subsequent visualization. We previously d...
Peter Gradwell, Michel A. Oey, Reinier J. Timmer, ...
« Prev « First page 4148 / 4286 Last » Next »