Sciweavers

1222 search results - page 208 / 245
» Verifying a File System Implementation
Sort
View
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
15 years 5 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...
ASPLOS
1998
ACM
15 years 4 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
DIMVA
2006
15 years 1 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
108
Voted
CCS
2010
ACM
14 years 12 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
77
Voted
TVCG
2008
93views more  TVCG 2008»
14 years 11 months ago
Interactive, Internet Delivery of Visualization via Structured Prerendered Multiresolution Imagery
Abstract-We present a novel approach for latency-tolerant remote visualization and rendering where client-side frame rate display performance is independent of source dataset size,...
Jerry Chen, Ilmi Yoon, Wes Bethel