Sciweavers

219 search results - page 12 / 44
» How useful are your comments
Sort
View
CACM
2006
192views more  CACM 2006»
13 years 7 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein

Book
2145views
15 years 5 months ago
An Introduction to Binary Search Trees and Balanced Trees
"Libavl is a library in ANSI C for manipulation of various types of binary trees. This book provides an introduction to binary tree techniques and presents all of Libavl’s ...
Ben Pfaff
SWAT
2004
Springer
142views Algorithms» more  SWAT 2004»
14 years 26 days ago
Getting the Best Response for Your Erg
We consider the speed scaling problem of minimizing the average response time of a collection of dynamically released jobs subject to a constraint A on energy used. We propose an ...
Kirk Pruhs, Patchrawat Uthaisombut, Gerhard J. Woe...
CHI
2009
ACM
13 years 11 months ago
Yours, mine and (not) ours: social influences on group information repositories
Group information repositories are systems for storing and organizing files in a central location all group members can access. The functionality and capabilities of these systems...
Emilee Rader
NSDI
2008
13 years 9 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...