Sciweavers

7596 search results - page 1304 / 1520
» Challenges in forensic computing
Sort
View
149
Voted
STOC
2009
ACM
181views Algorithms» more  STOC 2009»
16 years 5 months ago
The detectability lemma and quantum gap amplification
The quantum analog of a constraint satisfaction problem is a sum of local Hamiltonians - each (term of the) Hamiltonian specifies a local constraint whose violation contributes to...
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. V...
CCS
2009
ACM
16 years 5 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CHI
2009
ACM
16 years 5 months ago
Map torchlight: a mobile augmented reality camera projector unit
The advantages of paper-based maps have been utilized in the field of mobile Augmented Reality (AR) in the last few years. Traditional paper-based maps provide high-resolution, la...
Johannes Schöning, Michael Rohs, Sven G. Krat...
CHI
2009
ACM
16 years 5 months ago
Web search and browsing behavior under poor connectivity
Web search and browsing have been streamlined for a comfortable experience when the network connection is fast. Existing tools, however, are not optimized for scenarios where conn...
Jay Chen, Lakshminarayanan Subramanian, Kentaro To...
144
Voted
PPOPP
2009
ACM
16 years 5 months ago
A comprehensive strategy for contention management in software transactional memory
In Software Transactional Memory (STM), contention management refers to the mechanisms used to ensure forward progress-to avoid livelock and starvation, and to promote throughput ...
Michael F. Spear, Luke Dalessandro, Virendra J. Ma...
« Prev « First page 1304 / 1520 Last » Next »