Sciweavers

35419 search results - page 6980 / 7084
» How are we doing
Sort
View
161
Voted
BMCBI
2011
14 years 7 months ago
New Words in Human Mutagenesis
Background: The substitution rates within different nucleotide contexts are subject to varying levels of bias. The most well known example of such bias is the excess of C to T (C ...
Alexander Y. Panchin, Sergey I. Mitrofanov, Andrei...
121
Voted
CHI
2011
ACM
14 years 7 months ago
Towards a design model for women's empowerment in the developing world
Pulitzer Prize-winning journalist Nicholas Kristof argues that “in this century the paramount moral challenge will be the struggle for gender equality around the world.” In th...
Geeta Shroff, Matthew Kam
163
Voted
CHI
2011
ACM
14 years 7 months ago
Family portals: connecting families through a multifamily media space
Video conferencing allows distance-separated family members to interact somewhat akin to being together at the same place and time. Yet most video conferencing systems are designe...
Tejinder K. Judge, Carman Neustaedter, Steve Harri...
272
Voted
DIMVA
2011
14 years 7 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
138
Voted
EUROSYS
2011
ACM
14 years 7 months ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
« Prev « First page 6980 / 7084 Last » Next »