Sciweavers

1356 search results - page 233 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
SIGCOMM
2010
ACM
13 years 8 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
CIDR
2007
208views Algorithms» more  CIDR 2007»
13 years 9 months ago
Impliance: A Next Generation Information Management Appliance
Though database technology has been remarkably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of inf...
Bishwaranjan Bhattacharjee, Joseph S. Glider, Rich...
VVS
1998
IEEE
126views Visualization» more  VVS 1998»
14 years 5 days ago
Semi-Automatic Generation of Transfer Functions for Direct Volume Rendering
Although direct volume rendering is a powerful tool for visualizing complex structures within volume data, the size and complexity of the parameter space controlling the rendering...
Gordon L. Kindlmann, James W. Durkin
CAV
2010
Springer
214views Hardware» more  CAV 2010»
13 years 12 months ago
Learning Component Interfaces with May and Must Abstractions
elor Thesis: Demand Driven Abstraction Refinement • Advisor: Dr. Andrey Rybalchenko Kendriya Vidyalaya ONGC, Dehradun, Uttaranchal INDIA All India Senior Secondary Examination, ...
Rishabh Singh, Dimitra Giannakopoulou, Corina S. P...