Sciweavers

2913 search results - page 321 / 583
» How Much to Copy
Sort
View
CCS
2007
ACM
15 years 10 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
ISRR
2005
Springer
154views Robotics» more  ISRR 2005»
15 years 9 months ago
Session Overview Planning
ys when planning meant searching for a sequence of abstract actions that satisfied some symbolic predicate. Robots can now learn their own representations through statistical infe...
Nicholas Roy, Roland Siegwart
NLDB
2005
Springer
15 years 9 months ago
Natural Language Processing: Mature Enough for Requirements Documents Analysis?
Requirements engineering is the Achilles’ heel of the whole software development process, because requirements documents are often inconsistent and incomplete. Misunderstandings ...
Leonid Kof
ISCA
1996
IEEE
99views Hardware» more  ISCA 1996»
15 years 8 months ago
Performance Comparison of ILP Machines with Cycle Time Evaluation
Many studies have investigated performance improvement through exploiting instruction-level parallelism (ILP) with a particular architecture. Unfortunately, these studies indicate...
Tetsuya Hara, Hideki Ando, Chikako Nakanishi, Masa...
CEAS
2008
Springer
15 years 5 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown