Sciweavers

2747 search results - page 515 / 550
» Network externalities in software systems
Sort
View
SAS
2007
Springer
126views Formal Methods» more  SAS 2007»
14 years 2 months ago
Hierarchical Pointer Analysis for Distributed Programs
We present a new pointer analysis for use in shared memory programs running on hierarchical parallel machines. The analysis is motivated by the partitioned global address space lan...
Amir Kamil, Katherine A. Yelick
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
14 years 2 months ago
Should I Stay or Should I Go? Worker Commitment to Virtual Organizations
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
Yulin Fang, Derrick J. Neufeld
HICSS
2006
IEEE
174views Biometrics» more  HICSS 2006»
14 years 2 months ago
CrystalChat: Visualizing Personal Chat History
As more people take part in online conversations, awareness of the varying conversational styles and social mores afforded by different software is growing. However, this awarenes...
Annie Tat, M. Sheelagh T. Carpendale
ICPPW
2006
IEEE
14 years 2 months ago
Retargeting Image-Processing Algorithms to Varying Processor Grain Sizes
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
Sam Sander, Linda M. Wills
IMC
2006
ACM
14 years 2 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...