Sciweavers

1092 search results - page 180 / 219
» Do summaries help
Sort
View
141
Voted
SDM
2009
SIAM
138views Data Mining» more  SDM 2009»
16 years 29 days ago
ShatterPlots: Fast Tools for Mining Large Graphs.
Graphs appear in several settings, like social networks, recommendation systems, computer communication networks, gene/protein biological networks, among others. A deep, recurring...
Ana Paula Appel, Andrew Tomkins, Christos Faloutso...
133
Voted
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
16 years 20 days ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...
TLDI
2009
ACM
155views Formal Methods» more  TLDI 2009»
16 years 19 days ago
Opis: reliable distributed systems in OCaml
The importance of distributed systems is growing as computing devices become ubiquitous and bandwidth becomes plentiful. Concurrency and distribution pose algorithmic and implemen...
Pierre-Évariste Dagand, Dejan Kostic, Vikto...
128
Voted
CHI
2010
ACM
15 years 10 months ago
Now let me see where i was: understanding how lifelogs mediate memory
Lifelogging technologies can capture both mundane and important experiences in our daily lives, resulting in a rich record of the places we visit and the things we see. This study...
Vaiva Kalnikaité, Abigail Sellen, Steve Whi...
ACSAC
2009
IEEE
15 years 10 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson