Sciweavers

8760 search results - page 1697 / 1752
» Modeling users of intelligent systems
Sort
View
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 11 months ago
In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud c...
Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang
HOTNETS
2010
14 years 11 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
16 years 4 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
143
Voted
ICFP
2005
ACM
16 years 4 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
DRM
2007
Springer
15 years 10 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
« Prev « First page 1697 / 1752 Last » Next »