Sciweavers

751 search results - page 145 / 151
» Ur Web: A Simple Model for Programming the Web
Sort
View
97
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
ASPLOS
2011
ACM
14 years 3 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
WWW
2009
ACM
16 years 1 months ago
Bid optimization for broad match ad auctions
Ad auctions in sponsored search support"broad match"that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving mo...
Eyal Even-Dar, Vahab S. Mirrokni, S. Muthukrishnan...
144
Voted
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
14 years 10 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
120
Voted
MICCAI
2003
Springer
16 years 1 months ago
Extraction and Application of Expert Priors to Combine Multiple Segmentations of Human Brain Tissue
Abstract. This paper evaluates strategies to combine multiple segmentations of the same image, generated for example by different segmentation methods or by different human experts...
Torsten Rohlfing, Daniel B. Russakoff, Calvin R. M...