Sciweavers

5790 search results - page 866 / 1158
» Distributed programming with distributed authorization
Sort
View
169
Voted
SOFTVIS
2010
ACM
15 years 14 days ago
Dependence cluster visualization
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid ...
Syed S. Islam, Jens Krinke, David Binkley
155
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 5 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
16 years 4 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
122
Voted
WWW
2007
ACM
16 years 3 months ago
Web mashup scripting language
The Web Mashup Scripting Language (WMSL) enables an enduser ("you") working from his browser, e.g. not needing any other infrastructure, to quickly write mashups that in...
Marwan Sabbouh, Jeff Higginson, Salim Semy, Danny ...
147
Voted
PPOPP
2009
ACM
16 years 3 months ago
Comparability graph coloring for optimizing utilization of stream register files in stream processors
A stream processor executes an application that has been decomposed into a sequence of kernels that operate on streams of data elements. During the execution of a kernel, all stre...
Xuejun Yang, Li Wang, Jingling Xue, Yu Deng, Ying ...