Sciweavers

780 search results - page 94 / 156
» software 2011
Sort
View
ICST
2011
IEEE
14 years 1 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
AIM
2011
14 years 1 months ago
Transfer Learning by Reusing Structured Knowledge
Transfer learning aims to solve new learning problems by extracting and making use of the common knowledge found in related domains. A key element of transfer learning is to ident...
Qiang Yang, Vincent Wenchen Zheng, Bin Li, Hankz H...
CHI
2011
ACM
14 years 1 months ago
HCI for peace: a call for constructive action
Peace is an important value for the human-computer interaction research community, yet it has not resulted in the development of a research sub-community or even a research agenda...
Juan Pablo Hourcade, Natasha E. Bullock-Rest
EUROSYS
2011
ACM
14 years 1 months ago
Scarlett: coping with skewed content popularity in mapreduce clusters
To improve data availability and resilience MapReduce frameworks use file systems that replicate data uniformly. However, analysis of job logs from a large production cluster show...
Ganesh Ananthanarayanan, Sameer Agarwal, Srikanth ...
PPOPP
2011
ACM
14 years 15 days ago
ScalaExtrap: trace-based communication extrapolation for spmd programs
Performance modeling for scientific applications is important for assessing potential application performance and systems procurement in high-performance computing (HPC). Recent ...
Xing Wu, Frank Mueller