Sciweavers

8689 search results - page 101 / 1738
» Software: hard data
Sort
View
153
Voted
SIGSOFT
2005
ACM
16 years 5 months ago
Matching execution histories of program versions
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy...
Xiangyu Zhang, Rajiv Gupta
246
Voted
ASPLOS
2009
ACM
16 years 5 months ago
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering...
Aravind Menon, Simon Schubert, Willy Zwaenepoel
125
Voted
ICDM
2006
IEEE
143views Data Mining» more  ICDM 2006»
15 years 10 months ago
Applying Data Mining to Pseudo-Relevance Feedback for High Performance Text Retrieval
In this paper, we investigate the use of data mining, in particular the text classification and co-training techniques, to identify more relevant passages based on a small set of...
Xiangji Huang, Yan Rui Huang, Miao Wen, Aijun An, ...
CSUR
2010
373views more  CSUR 2010»
15 years 1 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
229
Voted
IJISEC
2007
66views more  IJISEC 2007»
15 years 4 months ago
Protecting data privacy through hard-to-reverse negative databases
The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set...
Fernando Esponda, Elena S. Ackley, Paul Helman, Ha...