Sciweavers

706 search results - page 113 / 142
» Clone-Aware Configuration Management
Sort
View
CCS
2008
ACM
14 years 22 days ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
CIKM
2008
Springer
14 years 22 days ago
Viability of in-house datamarting approaches for population genetics analysis of snp genotypes
Background: Databases containing very large amounts of SNP (Single Nucleotide Polymorphism) data are now freely available for researchers interested in medical and/or population g...
Jorge Amigo, Christopher Phillips, Antonio Salas
EMSOFT
2008
Springer
14 years 15 days ago
Tax-and-spend: democratic scheduling for real-time garbage collection
Real-time Garbage Collection (RTGC) has recently advanced to the point where it is being used in production for financial trading, military command-and-control, and telecommunicat...
Joshua S. Auerbach, David F. Bacon, Perry Cheng, D...
NSDI
2010
14 years 5 days ago
ElasticTree: Saving Energy in Data Center Networks
Networks are a shared resource connecting critical IT infrastructure, and the general practice is to always leave them on. Yet, meaningful energy savings can result from improving...
Brandon Heller, Srinivasan Seetharaman, Priya Maha...
VAMOS
2010
Springer
14 years 5 days ago
Variability in Time - Product Line Variability and Evolution Revisited
In its basic form, a variability model describes the variations among similar artifacts from a structural point of view. It does not capture any information about when these variat...
Christoph Elsner, Goetz Botterweck, Daniel Lohmann...