Sciweavers

12551 search results - page 2332 / 2511
» Informative Discriminant Analysis
Sort
View
PLDI
2003
ACM
15 years 10 months ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
SIGMETRICS
2003
ACM
101views Hardware» more  SIGMETRICS 2003»
15 years 10 months ago
Effects of clock resolution on the scheduling of interactive and soft real-time processes
It is commonly agreed that scheduling mechanisms in general purpose operating systems do not provide adequate support for modern interactive applications, notably multimedia appli...
Yoav Etsion, Dan Tsafrir, Dror G. Feitelson
175
Voted
ATAL
2003
Springer
15 years 10 months ago
Can software agents influence human relations?: balance theory in agent-mediated communities
We sought to create a social embodied conversational agent to support group interactions, using ‘balance theory’ from social science research on human-human relations. We cond...
Hideyuki Nakanishi, Satoshi Nakazawa, Toru Ishida,...
148
Voted
DRM
2003
Springer
15 years 10 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
152
Voted
ACSAC
2002
IEEE
15 years 10 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
« Prev « First page 2332 / 2511 Last » Next »