Sciweavers

551 search results - page 44 / 111
» Preventing existence
Sort
View
CHI
2007
ACM
16 years 7 days ago
Give and take: a study of consumer photo-sharing culture and practice
In this paper, we present initial findings from the study of a digital photo-sharing website: Flickr.com. In particular, we argue that Flickr.com appears to support--for some peop...
Andrew D. Miller, W. Keith Edwards
CC
2007
Springer
15 years 6 months ago
Preprocessing Strategy for Effective Modulo Scheduling on Multi-issue Digital Signal Processors
To achieve high resource utilization for multi-issue Digital Signal Processors (DSPs), production compilers commonly include variants of the iterative modulo scheduling algorithm. ...
Doosan Cho, Ravi Ayyagari, Gang-Ryung Uh, Yunheung...
CCGRID
2006
IEEE
15 years 6 months ago
Evaluating Performance and Scalability of Advanced Accelerator Simulations
Advanced accelerator simulations have played a prominent role in the design and analysis of modern accelerators. Given that accelerator simulations are computational intensive and...
Jungmin Lee, Zhiling Lan, J. Amundson, P. Spentzou...
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
16 years 8 hour ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
ICNP
2007
IEEE
15 years 6 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu