Sciweavers

42388 search results - page 8227 / 8478
» Classification Using Information
Sort
View
144
Voted
WWW
2001
ACM
16 years 4 months ago
Web-based personalization and management of interactive video
This paper describes an application framework for providing and managing personalized, interactive video on the web. The application framework enables content providers and aggreg...
Rune Hjelsvold, Subu Vdaygiri, Yves Léaut&e...
244
Voted
PLDI
2009
ACM
16 years 4 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
134
Voted
CCS
2009
ACM
16 years 4 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
136
Voted
CCS
2009
ACM
16 years 4 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
145
Voted
SIGCSE
2009
ACM
194views Education» more  SIGCSE 2009»
16 years 4 months ago
Integrating pedagogical code reviews into a CS 1 course: an empirical study
Formal code inspections are employed by teams of professional software engineers to identify software defects and improve the quality of software. After reviewing a piece of code ...
Christopher D. Hundhausen, Anukrati Agrawal, Dana ...
« Prev « First page 8227 / 8478 Last » Next »