Sciweavers

3497 search results - page 586 / 700
» Making Distributed Applications Robust
Sort
View
140
Voted
ACMICEC
2007
ACM
168views ECommerce» more  ACMICEC 2007»
15 years 6 months ago
Designing novel review ranking systems: predicting the usefulness and impact of reviews
With the rapid growth of the Internet, users' ability to publish content has created active electronic communities that provide a wealth of product information. Consumers nat...
Anindya Ghose, Panagiotis G. Ipeirotis
CASES
2007
ACM
15 years 6 months ago
INTACTE: an interconnect area, delay, and energy estimation tool for microarchitectural explorations
Prior work on modeling interconnects has focused on optimizing the wire and repeater design for trading off energy and delay, and is largely based on low level circuit parameters....
Rahul Nagpal, Arvind Madan, Bharadwaj Amrutur, Y. ...
CCS
2006
ACM
15 years 6 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
140
Voted
AFRIGRAPH
2001
ACM
15 years 6 months ago
Expressive textures
If a moving image is more expressive than words or than a still image, then an animated facial expression can explain more in depth the feelings of a virtual character. Facial ani...
K. Fei
130
Voted
CCS
2008
ACM
15 years 4 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...