Sciweavers

5048 search results - page 828 / 1010
» How to Personalize the Web
Sort
View
CCS
2008
ACM
13 years 11 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
DOCENG
2005
ACM
13 years 11 months ago
Injecting information into atomic units of text
This paper presents a new approach to text processing, based on textemes. These are atomic text units generalising the concepts of character and glyph by merging them in a common ...
Yannis Haralambous, Gábor Bella
BCSHCI
2008
13 years 11 months ago
The roles of time, place, value and relationships in collocated photo sharing with camera phones
Photo sharing on camera phones is becoming a common way to maintain closeness and relationships with friends and family. How people share their photos in collocated settings using...
Hanna Stelmaszewska, Bob Fields, Ann Blandford
APCCM
2004
13 years 11 months ago
Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE
A person working with diverse information sources--with possibly different formats and information models--may recognize and wish to express conceptual structures that are not exp...
Sudarshan Murthy, Lois M. L. Delcambre, David Maie...
CMG
2001
13 years 11 months ago
Jump Start Your Performance Career Using Analytic Modeling
What is the career path for a performance analyst? A capacity planner? Most technicians paid their dues in the trenches of systems programming or operations. Having done it all, t...
Denise P. Kalm