Sciweavers

1530 search results - page 201 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
147
Voted
SIGMOD
2012
ACM
226views Database» more  SIGMOD 2012»
13 years 6 months ago
SkewTune: mitigating skew in mapreduce applications
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...
103
Voted
CHI
2005
ACM
16 years 3 months ago
Feature congestion: a measure of display clutter
Management of clutter is an important factor in the design of user interfaces and information visualizations, allowing improved usability and aesthetics. However, clutter is not a...
Ruth Rosenholtz, Yuanzhen Li, Jonathan Mansfield, ...
109
Voted
WWW
2010
ACM
15 years 10 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
125
Voted
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 10 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
120
Voted
ERLANG
2004
ACM
15 years 9 months ago
Structured programming using processes
Structured Programming techniques are applied to a personal accounting software application implemented in erlang as a demonstration of the utility of processes as design construc...
Jay Nelson