Sciweavers

4360 search results - page 773 / 872
» Socio-technical systems: From design methods to systems engi...
Sort
View
PLDI
2006
ACM
15 years 6 months ago
Free-Me: a static analysis for automatic individual object reclamation
Garbage collection has proven benefits, including fewer memoryrelated errors and reduced programmer effort. Garbage collection, however, trades space for time. It reclaims memory...
Samuel Z. Guyer, Kathryn S. McKinley, Daniel Framp...
107
Voted
SACMAT
2010
ACM
15 years 5 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
98
Voted
CTW
2007
121views more  CTW 2007»
15 years 19 days ago
Regularly irregular: how groups reconcile cross-cutting agendas and demand in healthcare
Abstract The flow of technical work in acute healthcare varies unpredictably, in patterns that occur regularly enough that they can be managed. Acute care organizations develop wa...
Christopher P. Nemeth, Mark Nunnally, Michael F. O...
112
Voted
EUROSYS
2008
ACM
15 years 9 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
108
Voted
BMCBI
2005
92views more  BMCBI 2005»
15 years 17 days ago
FIGENIX: Intelligent automation of genomic annotation: expertise integration in a new software platform
Background: Two of the main objectives of the genomic and post-genomic era are to structurally and functionally annotate genomes which consists of detecting genes' position a...
Philippe Gouret, Vérane Vitiello, Nathalie ...