Sciweavers

359 search results - page 50 / 72
» What to Do About Microsoft
Sort
View
CHI
2007
ACM
15 years 10 months ago
Coordinating joint activity in avatar-mediated interaction
Massively multiplayer online games (MMOGs) currently represent the most widely used type of social 3D virtual worlds with millions of users worldwide. Although MMOGs take face-to-...
Robert J. Moore, E. Cabell Hankinson Gathman, Nico...
CHI
2005
ACM
15 years 10 months ago
The role of the author in topical blogs
Web logs, or blogs, challenge the notion of authorship. Seemingly, rather than a model in which the author's writings are themselves a contribution, the blog author weaves a ...
Scott Carter
OSDI
2002
ACM
15 years 9 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...
KBSE
2008
IEEE
15 years 3 months ago
Becoming responsive to service usage and performance changes by applying service feedback metrics to software maintenance
Software vendors are unaware of how their software performs in the field. They do not know what parts of their software are used and appreciated most and have little knowledge ab...
Henk van der Schuur, Slinger Jansen, Sjaak Brinkke...
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
15 years 3 months ago
DYSWIS: An architecture for automated diagnosis of networks
As the complexity of networked systems increases, we need mechanisms to automatically detect failures in the network and diagnose the cause of such failures. To realize true self-...
Vishal Kumar Singh, Henning Schulzrinne, Kai Miao