Sciweavers

1183 search results - page 127 / 237
» Risk Management with Benchmarking
Sort
View
TMM
2010
152views Management» more  TMM 2010»
14 years 11 months ago
Browsing Video Along Multiple Threads
This paper describes a novel method for browsing a large video collection. It links various forms of related video fragments together as threads. These threads are based on query r...
Ork de Rooij, Marcel Worring
WWW
2009
ACM
16 years 5 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
SOSP
2003
ACM
16 years 1 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
15 years 10 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...
KDD
2007
ACM
179views Data Mining» more  KDD 2007»
15 years 10 months ago
Mining statistically important equivalence classes and delta-discriminative emerging patterns
The support-confidence framework is the most common measure used in itemset mining algorithms, for its antimonotonicity that effectively simplifies the search lattice. This com...
Jinyan Li, Guimei Liu, Limsoon Wong