Sciweavers

548 search results - page 26 / 110
» Liberate Computer User from Programming
Sort
View
HOTOS
1999
IEEE
14 years 29 days ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
WWW
2008
ACM
14 years 9 months ago
Characterizing typical and atypical user sessions in clickstreams
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and...
Narayanan Sadagopan, Jie Li
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 8 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
VRML
1999
ACM
14 years 29 days ago
Staging the Space of Mixed Reality - Reconsidering the Concept of a Multi User Environment
This paper presents our work and research findings on developing the concept of a multi-user shared environment for culture, performance, art and entertainment. It introduces arti...
Wolfgang Strauss, Monika Fleischmann, Mette Thomse...
ACSAC
1998
IEEE
14 years 28 days ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang