Sciweavers

4650 search results - page 789 / 930
» Generating and evaluating evaluative arguments
Sort
View
CHI
2008
ACM
16 years 2 months ago
Improving the performance of motor-impaired users with automatically-generated, ability-based interfaces
We evaluate two systems for automatically generating personalized interfaces adapted to the individual motor capabilities of users with motor impairments. The first system, SUPPLE...
Krzysztof Z. Gajos, Jacob O. Wobbrock, Daniel S. W...
POPL
2006
ACM
16 years 2 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
190
Voted
SIGMOD
2007
ACM
179views Database» more  SIGMOD 2007»
16 years 1 months ago
How to barter bits for chronons: compression and bandwidth trade offs for database scans
Two trends are converging to make the CPU cost of a table scan a more important component of database performance. First, table scans are becoming a larger fraction of the query p...
Allison L. Holloway, Vijayshankar Raman, Garret Sw...
227
Voted
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
16 years 1 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
EDBT
2004
ACM
147views Database» more  EDBT 2004»
16 years 1 months ago
Projection Pushing Revisited
The join operation, which combines tuples from multiple relations, is the most fundamental and, typically, the most expensive operation in database queries. The standard approach t...
Benjamin J. McMahan, Guoqiang Pan, Patrick Porter,...