Sciweavers

9162 search results - page 1651 / 1833
» System and User Data Complexity
Sort
View
148
Voted
SIGMOD
2012
ACM
226views Database» more  SIGMOD 2012»
13 years 6 months ago
SkewTune: mitigating skew in mapreduce applications
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...
98
Voted
CHI
2009
ACM
16 years 4 months ago
Visualizing remote voice conversations
Online voice conversations are becoming ever more popular. People have been logging online text conversations, but what about voice conversations? Walter Ong simply states, "...
Pooja Mathur, Karrie Karahalios
138
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
117
Voted
CCS
2009
ACM
15 years 10 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
AH
2008
Springer
15 years 10 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
« Prev « First page 1651 / 1833 Last » Next »