Sciweavers

770 search results - page 141 / 154
» Experience in e-Science Requirements Engineering
Sort
View
91
Voted
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
15 years 11 months ago
Automatic identification of quasi-experimental designs for discovering causal knowledge
Researchers in the social and behavioral sciences routinely rely on quasi-experimental designs to discover knowledge from large databases. Quasi-experimental designs (QEDs) exploi...
David D. Jensen, Andrew S. Fast, Brian J. Taylor, ...
LCTRTS
2009
Springer
15 years 5 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
MIDDLEWARE
2007
Springer
15 years 4 months ago
Interactive Resource-Intensive Applications Made Easy
Snowbird is a middleware system based on virtual machine (VM) technology that simplifies the development and deployment of bimodal applications. Such applications alternate betwee...
H. Andrés Lagar-Cavilla, Niraj Tolia, Eyal ...
ICML
1999
IEEE
15 years 2 months ago
Learning Hierarchical Performance Knowledge by Observation
Developing automated agents that intelligently perform complex real world tasks is time consuming and expensive. The most expensive part of developing these intelligent task perfo...
Michael van Lent, John E. Laird
76
Voted
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 2 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...