Sciweavers

2542 search results - page 457 / 509
» One step ahead
Sort
View
SIGIR
2010
ACM
15 years 3 months ago
Studying trailfinding algorithms for enhanced web search
Search engines return ranked lists of Web pages in response to queries. These pages are starting points for post-query navigation, but may be insufficient for search tasks involvi...
Adish Singla, Ryen White, Jeff Huang
99
Voted
SOUPS
2010
ACM
15 years 3 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
EMSOFT
2009
Springer
15 years 3 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
ACSAC
2004
IEEE
15 years 2 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
CAISE
2006
Springer
15 years 2 months ago
Model-Driven Enterprise Systems Configuration
Enterprise Systems potentially lead to significant efficiency gains but require a well-conducted configuration process. A promising idea to manage and simplify the configuration pr...
Jan Recker, Jan Mendling, Wil M. P. van der Aalst,...