Sciweavers

1456 search results - page 189 / 292
» The Layer-Independent Descriptor Concept
Sort
View
CCS
2007
ACM
15 years 3 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
CF
2007
ACM
15 years 3 months ago
Identifying potential parallelism via loop-centric profiling
The transition to multithreaded, multi-core designs places a greater responsibility on programmers and software for improving performance; thread-level parallelism (TLP) will be i...
Tipp Moseley, Daniel A. Connors, Dirk Grunwald, Ra...
CIKM
2007
Springer
15 years 3 months ago
Web search personalization with ontological user profiles
Every user has a distinct background and a specific goal when searching for information on the Web. The goal of Web search personalization is to tailor search results to a particu...
Ahu Sieg, Bamshad Mobasher, Robin D. Burke
DAC
2007
ACM
15 years 3 months ago
A Framework for the Validation of Processor Architecture Compliance
We present a framework for validating the compliance of a design with a given architecture. Our approach is centered on the concept of misinterpretations. These include missing be...
Allon Adir, Sigal Asaf, Laurent Fournier, Itai Jae...
CIKM
2009
Springer
15 years 3 months ago
Suffix trees for very large genomic sequences
A suffix tree is a fundamental data structure for string searching algorithms. Unfortunately, when it comes to the use of suffix trees in real-life applications, the current metho...
Marina Barsky, Ulrike Stege, Alex Thomo, Chris Upt...