Sciweavers

26354 search results - page 5085 / 5271
» How we refactor, and how we know it
Sort
View
SIGADA
2004
Springer
15 years 7 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
VLDB
2004
ACM
103views Database» more  VLDB 2004»
15 years 7 months ago
WIC: A General-Purpose Algorithm for Monitoring Web Information Sources
The Web is becoming a universal information dissemination medium, due to a number of factors including its support for content dynamicity. A growing number of Web information prov...
Sandeep Pandey, Kedar Dhamdhere, Christopher Olsto...
112
Voted
WAPCV
2004
Springer
15 years 7 months ago
Towards a Biologically Plausible Active Visual Search Model
Abstract. This paper proposes a neuronal-based solution to active visual search, that is, visual search for a given target in displays that are too large in spatial extent to be in...
Andrei Zaharescu, Albert L. Rothenstein, John K. T...
106
Voted
CHI
2010
ACM
15 years 7 months ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
133
Voted
ACSC
2003
IEEE
15 years 7 months ago
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf
As the Internet and enterprise wide distributed systems become more prevalent in business IT systems, numerous advanced COTS (commercial off-the-shelf) middleware technologies hav...
Yan Zhang, Anna Liu, Wei Qu
« Prev « First page 5085 / 5271 Last » Next »