Sciweavers

15379 search results - page 308 / 3076
» Protecting users from
Sort
View
78
Voted
HOTOS
2003
IEEE
15 years 4 months ago
Cosy: Develop in User-Land, Run in Kernel-Mode
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...
ACMICEC
2007
ACM
129views ECommerce» more  ACMICEC 2007»
15 years 3 months ago
Modeling trust in e-commerce: an approach based on user requirements
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
Alireza Pourshahid, Thomas T. Tran
USITS
2001
15 years 21 days ago
Alpine: A User-Level Infrastructure for Network Protocol Development
In traditional operating systems, modifying the network protocol code is a tedious and error-prone task, largely because the networking stack resides in the kernel. For this reaso...
David Ely, Stefan Savage, David Wetherall
IPPS
2010
IEEE
14 years 9 months ago
User level DB: a debugging API for user-level thread libraries
With the advent of the multicore era, parallel programming is becoming ubiquitous. Multithreading is a common approach to benefit from these architectures. Hybrid M:N libraries lik...
Kevin Pouget, Marc Pérache, Patrick Carriba...
SIGIR
2009
ACM
15 years 5 months ago
Global ranking by exploiting user clicks
It is now widely recognized that user interactions with search results can provide substantial relevance information on the documents displayed in the search results. In this pape...
Shihao Ji, Ke Zhou, Ciya Liao, Zhaohui Zheng, Gui-...