Sciweavers

861 search results - page 162 / 173
» Predicting Attack-prone Components
Sort
View
CLUSTER
2007
IEEE
13 years 11 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
SIGIR
2010
ACM
13 years 11 months ago
The good, the bad, and the random: an eye-tracking study of ad quality in web search
We investigate how people interact with Web search engine result pages using eye-tracking. While previous research has focused on the visual attention devoted to the 10 organic se...
Georg Buscher, Susan T. Dumais, Edward Cutrell
EUROPAR
2006
Springer
13 years 11 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
ICDCS
1991
IEEE
13 years 11 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste
NSDI
2008
13 years 10 months ago
Beyond Pilots: Keeping Rural Wireless Networks Alive
Very few computer systems that have been deployed in rural developing regions manage to stay operationally sustainable over the long term; most systems do not go beyond the pilot ...
Sonesh Surana, Rabin K. Patra, Sergiu Nedevschi, M...