Sciweavers

7839 search results - page 1344 / 1568
» What's there and what's not
Sort
View
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
121
Voted
ACMSE
2006
ACM
15 years 7 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
125
Voted
ASPLOS
2006
ACM
15 years 7 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
107
Voted
ASPLOS
2006
ACM
15 years 7 months ago
Tradeoffs in transactional memory virtualization
For transactional memory (TM) to achieve widespread acceptance, transactions should not be limited to the physical resources of any specific hardware implementation. TM systems s...
JaeWoong Chung, Chi Cao Minh, Austen McDonald, Tra...
CSCW
2006
ACM
15 years 7 months ago
Don't look stupid: avoiding pitfalls when recommending research papers
If recommenders are to help people be more productive, they need to support a wide variety of real-world information seeking tasks, such as those found when seeking research paper...
Sean M. McNee, Nishikant Kapoor, Joseph A. Konstan
« Prev « First page 1344 / 1568 Last » Next »