Sciweavers

2687 search results - page 470 / 538
» On the Conversion between Number Systems
Sort
View
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
14 years 1 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ACSAC
1998
IEEE
14 years 1 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
CGO
2007
IEEE
14 years 24 days ago
Shadow Profiling: Hiding Instrumentation Costs with Parallelism
In profiling, a tradeoff exists between information and overhead. For example, hardware-sampling profilers incur negligible overhead, but the information they collect is consequen...
Tipp Moseley, Alex Shye, Vijay Janapa Reddi, Dirk ...
CIKM
2006
Springer
14 years 16 days ago
Evaluation by comparing result sets in context
Familiar evaluation methodologies for information retrieval (IR) are not well suited to the task of comparing systems in many real settings. These systems and evaluation methods m...
Paul Thomas, David Hawking
ER
2000
Springer
114views Database» more  ER 2000»
14 years 12 days ago
From Web Sites to Web Applications: New Issues for Conceptual Modeling
Abstract E-commerce, web-based booking systems, and on-line auction systems are only a few examples that demonstrate how WWW sites are evolving from hypermedia information reposito...
Luciano Baresi, Franca Garzotto, Paolo Paolini