Sciweavers

35419 search results - page 6908 / 7084
» How are we doing
Sort
View
SIGADA
2004
Springer
15 years 9 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
VLDB
2004
ACM
103views Database» more  VLDB 2004»
15 years 9 months ago
WIC: A General-Purpose Algorithm for Monitoring Web Information Sources
The Web is becoming a universal information dissemination medium, due to a number of factors including its support for content dynamicity. A growing number of Web information prov...
Sandeep Pandey, Kedar Dhamdhere, Christopher Olsto...
WAPCV
2004
Springer
15 years 9 months ago
Towards a Biologically Plausible Active Visual Search Model
Abstract. This paper proposes a neuronal-based solution to active visual search, that is, visual search for a given target in displays that are too large in spatial extent to be in...
Andrei Zaharescu, Albert L. Rothenstein, John K. T...
125
Voted
CHI
2010
ACM
15 years 9 months ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
ACSC
2003
IEEE
15 years 9 months ago
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf
As the Internet and enterprise wide distributed systems become more prevalent in business IT systems, numerous advanced COTS (commercial off-the-shelf) middleware technologies hav...
Yan Zhang, Anna Liu, Wei Qu
« Prev « First page 6908 / 7084 Last » Next »