Sciweavers

686 search results - page 108 / 138
» Empirical Studies in Reverse Engineering
Sort
View
NSDI
2008
14 years 12 months ago
Peeking into Spammer Behavior from a Unique Vantage Point
Understanding the spammer behavior is a critical step in the long-lasting battle against email spams. Previous studies have focused on setting up honeypots or email sinkholes cont...
Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao
CHI
2005
ACM
15 years 10 months ago
Gender HCI issues in problem-solving software
Thus far, researchers have not investigated gender HCI issues in the context of end-user problem-solving software. Designers' ignorance of gender differences is particularly ...
Laura Beckwith
BPM
2009
Springer
145views Business» more  BPM 2009»
15 years 4 months ago
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes
The effect of using automated auditing tools to detect compliance failures in unmanaged business processes is investigated. In the absence of a process execution engine, compliance...
Yurdaer N. Doganata, Francisco Curbera
69
Voted
SAT
2009
Springer
119views Hardware» more  SAT 2009»
15 years 4 months ago
Backdoors in the Context of Learning
The concept of backdoor variables has been introduced as a structural property of combinatorial problems that provides insight into the surprising ability of modern satisfiability...
Bistra N. Dilkina, Carla P. Gomes, Ashish Sabharwa...
ISORC
2008
IEEE
15 years 4 months ago
Toward Effective Multi-Capacity Resource Allocation in Distributed Real-Time and Embedded Systems
Effective resource management for distributed real-time embedded (DRE) systems is hard due to their unique characteristics, including (1) constraints in multiple resources and (2)...
Nilabja Roy, John S. Kinnebrew, Nishanth Shankaran...