Sciweavers

730 search results - page 138 / 146
» Digital libraries' support for the user's 'information journ...
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
BMVC
2001
13 years 11 months ago
Hue that is invariant to brightness and gamma
Hue provides a useful and intuitive cue that is used in a variety of computer vision applications. Hue is an attractive feature as it captures intrinsic information about the colo...
Graham D. Finlayson, Gerald Schaefer
WIKIS
2009
ACM
14 years 3 months ago
Measuring the wikisphere
Due to the inherent difficulty in obtaining experimental data from wikis, past quantitative wiki research has largely been focused on Wikipedia, limiting the degree that it can be...
Jeff Stuckman, James Purtilo
MOBISYS
2010
ACM
13 years 10 months ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
SOSP
2003
ACM
14 years 5 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...