Sciweavers

16843 search results - page 3286 / 3369
» On Generalized Authorization Problems
Sort
View
129
Voted
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
15 years 27 days ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
102
Voted
SOFTVIS
2010
ACM
15 years 27 days ago
An interactive ambient visualization for code smells
Code smells are characteristics of software that indicate that code may have a design problem. Code smells have been proposed as a way for programmers to recognize the need for re...
Emerson R. Murphy-Hill, Andrew P. Black
117
Voted
SOUPS
2010
ACM
15 years 27 days ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
TLDI
2010
ACM
198views Formal Methods» more  TLDI 2010»
15 years 27 days ago
Verifying event-driven programs using ramified frame properties
Interactive programs, such as GUIs or spreadsheets, often maintain dependency information over dynamically-created networks of objects. That is, each imperative object tracks not ...
Neel R. Krishnaswami, Lars Birkedal, Jonathan Aldr...
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
15 years 27 days ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
« Prev « First page 3286 / 3369 Last » Next »