Sciweavers

1993 search results - page 259 / 399
» Designing and Building Parallel Program
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
116
Voted
APVIS
2008
15 years 3 months ago
Interactive Visual Analysis of the NSF Funding Information
This paper presents an interactive visualization toolkit for navigating and analyzing the National Science Foundation (NSF) funding information. Our design builds upon the treemap...
Shixia Liu, Nan Cao, Hao Lv
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
15 years 8 months ago
An Integrated Architecture for Demand Response Communications and Control
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
HICSS
2002
IEEE
114views Biometrics» more  HICSS 2002»
15 years 7 months ago
Advanced Question and Answering Systems for Community Development
The Internet has made transfer of knowledge of successful community development programs and processes possible by allowing practitioners to connect through computer-mediated-comm...
Queen Esther Booker, Ana V. Lopez, Michael McQuaid...
ECOOP
1998
Springer
15 years 6 months ago
Wrappers to the Rescue
Wrappers are mechanisms for introducing new behavior that is executed before and/or after, and perhaps even in lieu of, an existing method. This paper examines several ways to impl...
John Brant, Brian Foote, Ralph E. Johnson, Don Rob...