Sciweavers

2392 search results - page 373 / 479
» Channel-Hopping Multiple Access
Sort
View
CHI
2009
ACM
16 years 4 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
HPCA
2009
IEEE
16 years 4 months ago
Feedback mechanisms for improving probabilistic memory prefetching
This paper presents three techniques for improving the effectiveness of the recently proposed Adaptive Stream Detection (ASD) prefetching mechanism. The ASD prefetcher is a standa...
Ibrahim Hur, Calvin Lin
HPCA
2009
IEEE
16 years 4 months ago
Dynamic hardware-assisted software-controlled page placement to manage capacity allocation and sharing within large caches
In future multi-cores, large amounts of delay and power will be spent accessing data in large L2/L3 caches. It has been recently shown that OS-based page coloring allows a non-uni...
Manu Awasthi, Kshitij Sudan, Rajeev Balasubramonia...
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
16 years 4 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
CHI
2008
ACM
16 years 4 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi