Sciweavers

290 search results - page 36 / 58
» Comparing and managing multiple versions of slide presentati...
Sort
View
CHI
1997
ACM
15 years 4 months ago
Elastic Windows: Evaluation of Multi-Window Operations
Most windowing systems follow the independent overlapping windows approach, which emerged as an answer to the needs of the 1980s’ technology. Due to advances in computers and di...
Eser Kandogan, Ben Shneiderman
DSN
2004
IEEE
15 years 3 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
ECAI
2000
Springer
15 years 4 months ago
Similarity-based Approach to Relevance Learning
In several information retrieval (IR) systems there is a possibility for user feedback. Many machine learning methods have been proposed that learn from the feedback information in...
Rickard Cöster, Lars Asker
PLDI
2006
ACM
15 years 5 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn
IEEEPACT
2009
IEEE
14 years 9 months ago
FASTM: A Log-based Hardware Transactional Memory with Fast Abort Recovery
Abstract--Version management, one of the key design dimensions of Hardware Transactional Memory (HTM) systems, defines where and how transactional modifications are stored. Current...
Marc Lupon, Grigorios Magklis, Antonio Gonzá...