Sciweavers

4445 search results - page 783 / 889
» Reflective Authorization Systems
Sort
View
EDBT
2011
ACM
256views Database» more  EDBT 2011»
14 years 1 months ago
RanKloud: a scalable ranked query processing framework on hadoop
The popularity of batch-oriented cluster architectures like Hadoop is on the rise. These batch-based systems successfully achieve high degrees of scalability by carefully allocati...
K. Selçuk Candan, Parth Nagarkar, Mithila N...
111
Voted
ASPLOS
2012
ACM
13 years 5 months ago
Comprehensive kernel instrumentation via dynamic binary translation
Dynamic binary translation (DBT) is a powerful technique that enables fine-grained monitoring and manipulation of an existing program binary. At the user level, it has been emplo...
Peter Feiner, Angela Demke Brown, Ashvin Goel
IUI
2012
ACM
13 years 5 months ago
PhysicsBook: a sketch-based interface for animating physics diagrams
We present PhysicsBook, a prototype system that enables users to solve physics problems using a sketch-based interface and then animates any diagram used in solving the problem to...
Salman Cheema, Joseph J. LaViola Jr.
KDD
2012
ACM
226views Data Mining» more  KDD 2012»
13 years 15 days ago
TourViz: interactive visualization of connection pathways in large graphs
We present TOURVIZ, a system that helps its users to interactively visualize and make sense in large network datasets. In particular, it takes as input a set of nodes the user spe...
Duen Horng Chau, Leman Akoglu, Jilles Vreeken, Han...
WWW
2009
ACM
15 years 10 months ago
Blog credibility ranking by exploiting verified content
People use weblogs to express thoughts, present ideas and share knowledge. However, weblogs can also be misused to influence and manipulate the readers. Therefore the credibility ...
Andreas Juffinger, Michael Granitzer, Elisabeth Le...