Sciweavers

342 search results - page 61 / 69
» The Foundations and Architecture of Autotutor
Sort
View
EDBT
2009
ACM
302views Database» more  EDBT 2009»
15 years 4 months ago
RankClus: integrating clustering with ranking for heterogeneous information network analysis
As information networks become ubiquitous, extracting knowledge from information networks has become an important task. Both ranking and clustering can provide overall views on in...
Yizhou Sun, Jiawei Han, Peixiang Zhao, Zhijun Yin,...
NCA
2009
IEEE
15 years 4 months ago
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization
: © Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner HP Laboratories HPL-2009-115 device dri...
Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio ...
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 4 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
CASES
2009
ACM
15 years 4 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...
SACMAT
2009
ACM
15 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...