Sciweavers

1228 search results - page 169 / 246
» Copyright
Sort
View
SOUPS
2006
ACM
15 years 4 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 4 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
ISCC
2005
IEEE
101views Communications» more  ISCC 2005»
15 years 3 months ago
Comparing and Evaluating Lightweight Solutions for Replica Dissemination and Retrieval in Dense MANETs
There is an emerging market interest in service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and unive...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
KBSE
2005
IEEE
15 years 3 months ago
Empirical evaluation of the tarantula automatic fault-localization technique
The high cost of locating faults in programs has motivated the development of techniques that assist in fault localization by automating part of the process of searching for fault...
James A. Jones, Mary Jean Harrold
ANCS
2005
ACM
15 years 3 months ago
Resource mapping and scheduling for heterogeneous network processor systems
Task to resource mapping problems are encountered during (i) hardware-software co-design and (ii) performance optimization of Network Processor systems. The goal of the first pro...
Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinh...