Sciweavers

484 search results - page 86 / 97
» Caching function calls using precise dependencies
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
COLT
1998
Springer
14 years 20 days ago
Robust Learning Aided by Context
Empirical studies of multitask learning provide some evidence that the performance of a learning system on its intended targets improves by presenting to the learning system relat...
John Case, Sanjay Jain, Matthias Ott, Arun Sharma,...
INFOCOM
2005
IEEE
14 years 2 months ago
Capturing accurate snapshots of the Gnutella network
— A common approach for measurement-based characterization of peer-to-peer (P2P) systems is to capture overlay snapshots using a crawler. The accuracy of captured snapshots by P2...
Daniel Stutzbach, Reza Rejaie
ICSE
2010
IEEE-ACM
14 years 13 days ago
Code bubbles: rethinking the user interface paradigm of integrated development environments
Today’s integrated development environments (IDEs) are hampered by their dependence on files and file-based editing. We propose a novel user interface that is based on collectio...
Andrew Bragdon, Steven P. Reiss, Robert C. Zelezni...
KES
2008
Springer
13 years 7 months ago
Building an Index of Nanomedical Resources: An Automatic Approach Based on Text Mining
Nanomedicine is an emerging discipline aimed to applying recent developments in nanotechnology to the medical domain. In recent years, there has been an exponential growth of the n...
Stefano Chiesa, Miguel García-Remesal, Guil...