Sciweavers

247 search results - page 33 / 50
» Information hiding for trusted system design
Sort
View
BCSHCI
2007
13 years 9 months ago
"The devil you know knows best": how online recommendations can benefit from social networking
The defining characteristic of the Internet today is an abundance of information and choice. Recommender Systems (RS), designed to alleviate this problem, have so far not been ver...
Philip Bonhard, Martina Angela Sasse, Clare Harrie...
VIZSEC
2004
Springer
14 years 25 days ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
WWW
2010
ACM
14 years 2 months ago
Highlighting disputed claims on the web
We describe Dispute Finder, a browser extension that alerts a user when information they read online is disputed by a source that they might trust. Dispute Finder examines the tex...
Rob Ennals, Beth Trushkowsky, John Mark Agosta
DAC
2000
ACM
14 years 8 months ago
Memory aware compilation through accurate timing extraction
Memory delays represent a major bottleneck in embedded systems performance. Newer memory modules exhibiting efficient access modes (e.g., page-, burst-mode) partly alleviate this ...
Peter Grun, Nikil D. Dutt, Alexandru Nicolau
CASES
2006
ACM
13 years 11 months ago
Power efficient branch prediction through early identification of branch addresses
Ever increasing performance requirements have elevated deeply pipelined architectures to a standard even in the embedded processor domain, requiring the incorporation of dynamic b...
Chengmo Yang, Alex Orailoglu