Sciweavers

817 search results - page 142 / 164
» On 2-factors with k components
Sort
View
HPCA
2008
IEEE
15 years 10 months ago
DeCoR: A Delayed Commit and Rollback mechanism for handling inductive noise in processors
Increases in peak current draw and reductions in the operating voltages of processors continue to amplify the importance of dealing with voltage fluctuations in processors. Noise-...
Meeta Sharma Gupta, Krishna K. Rangan, Michael D. ...
CHI
2004
ACM
15 years 10 months ago
3Book: a scalable 3D virtual book
This paper describes the 3Book, a 3D interactive visualization of a codex book as a component for digital library and information-intensive applications. The 3Book is able to repr...
Stuart K. Card, Lichan Hong, Jock D. Mackinlay, Ed...
141
Voted
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
15 years 9 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
IUI
2009
ACM
15 years 6 months ago
Trailblazer: enabling blind users to blaze trails through the web
For blind web users, completing tasks on the web can be frustrating. Each step can require a time-consuming linear search of the current web page to find the needed interactive e...
Jeffrey P. Bigham, Tessa A. Lau, Jeffrey Nichols
CCS
2009
ACM
15 years 4 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu