Sciweavers

10625 search results - page 2040 / 2125
» Supporting delay-intolerant applications
Sort
View
CCS
2009
ACM
15 years 10 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
CHI
2009
ACM
15 years 10 months ago
Towards intelligent authoring tools for machinima creation
As user-created content increasingly becomes an ever more prominent element of modern game design, tools have been developed to aide in the creative process for several forms of d...
Brian O'Neill, Mark O. Riedl, Michael Nitsche
CHI
2009
ACM
15 years 10 months ago
Synchronized communication and coordinated views: qualitative data discovery for team game user studies
We present a tool for qualitative data discovery that aids researchers in analyzing synchronized log data with audio collected from multiple computers. The tool was originally dev...
William A. Hamilton, Zachary O. Toups, Andruid Ker...
PODC
2009
ACM
15 years 10 months ago
Max registers, counters, and monotone circuits
A method is given for constructing a max register, a linearizable, wait-free concurrent data structure that supports a write operation and a read operation that returns the larges...
James Aspnes, Hagit Attiya, Keren Censor
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
15 years 10 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
« Prev « First page 2040 / 2125 Last » Next »