Sciweavers

1173 search results - page 197 / 235
» Identifying Successful Telecommuters
Sort
View
ASWEC
2009
IEEE
14 years 5 months ago
Semantic Impact and Faults in Source Code Changes: An Empirical Study
Changes to source code have become a critical factor in fault predictions. Text or syntactic approaches have been widely used. Textual analysis focuses on changed text fragments w...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
VEE
2009
ACM
246views Virtualization» more  VEE 2009»
14 years 5 months ago
Tracing for web 3.0: trace compilation for the next generation web applications
Today’s web applications are pushing the limits of modern web browsers. The emergence of the browser as the platform of choice for rich client-side applications has shifted the ...
Mason Chang, Edwin W. Smith, Rick Reitmaier, Micha...
WISEC
2009
ACM
14 years 5 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
EDBT
2009
ACM
166views Database» more  EDBT 2009»
14 years 5 months ago
Shore-MT: a scalable storage manager for the multicore era
Database storage managers have long been able to efficiently handle multiple concurrent requests. Until recently, however, a computer contained only a few single-core CPUs, and th...
Ryan Johnson, Ippokratis Pandis, Nikos Hardavellas...
CSFW
2009
IEEE
14 years 5 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson