Sciweavers

6978 search results - page 1226 / 1396
» On Proofs in System P
Sort
View
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 4 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 4 months ago
Making it Hard to Lie: Cultural Determinants of Media Choice for Deception
In today’s business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate’s abilitie...
Christopher P. Furner, Joey F. George
SC
2009
ACM
14 years 4 months ago
Enabling software management for multicore caches with a lightweight hardware support
The management of shared caches in multicore processors is a critical and challenging task. Many hardware and OS-based methods have been proposed. However, they may be hardly adop...
Jiang Lin, Qingda Lu, Xiaoning Ding, Zhao Zhang, X...
ICS
2009
Tsinghua U.
14 years 4 months ago
Parametric multi-level tiling of imperfectly nested loops
Tiling is a crucial loop transformation for generating high performance code on modern architectures. Efficient generation of multilevel tiled code is essential for maximizing da...
Albert Hartono, Muthu Manikandan Baskaran, C&eacut...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 4 months ago
Ad quality on TV: predicting television audience retention
This paper explores the impact of television advertisements on audience retention using data collected from television set-top boxes (STBs)1 . In particular, we discuss how the ac...
Yannet Interian, Sundar Dorai-Raj, Igor Naverniouk...
« Prev « First page 1226 / 1396 Last » Next »