Sciweavers

12052 search results - page 1992 / 2411
» computing 2010
Sort
View
EUROSYS
2010
ACM
15 years 9 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
HT
2010
ACM
15 years 9 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
IWCMC
2010
ACM
15 years 9 months ago
Dividing sensitive ranges based mobility prediction algorithm in wireless networks
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Yuliang Tang, Der-Jiunn Deng, Yannan Yuan, Chun-Ch...
JCDL
2010
ACM
238views Education» more  JCDL 2010»
15 years 9 months ago
BinarizationShop: a user-assisted software suite for converting old documents to black-and-white
Converting a scanned document to a binary format (black and white) is a key step in the digitization process. While many existing binarization algorithms operate robustly for well...
Fanbo Deng, Zheng Wu, Zheng Lu, Michael S. Brown
PLDI
2010
ACM
15 years 9 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
« Prev « First page 1992 / 2411 Last » Next »