Sciweavers

6187 search results - page 1164 / 1238
» Practical Software Measurement
Sort
View
CCS
2007
ACM
15 years 9 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
121
Voted
DATE
2006
IEEE
152views Hardware» more  DATE 2006»
15 years 9 months ago
Adaptive chip-package thermal analysis for synthesis and design
Ever-increasing integrated circuit (IC) power densities and peak temperatures threaten reliability, performance, and economical cooling. To address these challenges, thermal analy...
Yonghong Yang, Zhenyu (Peter) Gu, Changyun Zhu, Li...
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 9 months ago
Project Establishment in the Context of Participatory Design: Experience from a Hospital Information System Development Project
This paper reports on a project establishment undertaking as proposed by the STEPS methodology (Software Technology for Evolutionary Participatory System Design). Project establis...
Salesio Mbogo Kiura
HPDC
2006
IEEE
15 years 9 months ago
Materializing Highly Available Grids
Grids are becoming a mission-critical component in research and industry. The services they provide are thus required to be highly available, contributing to the vision of the Gri...
Mark Silberstein, Gabriel Kliot, Artyom Sharov, As...
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
15 years 9 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
« Prev « First page 1164 / 1238 Last » Next »