Sciweavers

413 search results - page 76 / 83
» IT alignment: what have we learned
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 1 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
TIP
2011
217views more  TIP 2011»
13 years 2 months ago
Contextual Object Localization With Multiple Kernel Nearest Neighbor
—Recently, many object localization models have shown that incorporating contextual cues can greatly improve accuracy over using appearance features alone. Therefore, many of the...
Brian McFee, Carolina Galleguillos, Gert R. G. Lan...
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 10 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
COCO
2010
Springer
153views Algorithms» more  COCO 2010»
13 years 11 months ago
Communication Complexity with Synchronized Clocks
Abstract—We consider two natural extensions of the communication complexity model that are inspired by distributed computing. In both models, two parties are equipped with synchr...
Russell Impagliazzo, Ryan Williams
JOT
2007
170views more  JOT 2007»
13 years 7 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence