Sciweavers

289 search results - page 50 / 58
» Provenance: a future history
Sort
View
CCS
2005
ACM
14 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ICS
2004
Tsinghua U.
14 years 3 months ago
Scaling the issue window with look-ahead latency prediction
In contemporary out-of-order superscalar design, high IPC is mainly achieved by exposing high instruction level parallelism (ILP). Scaling issue window size can certainly provide ...
Yongxiang Liu, Anahita Shayesteh, Gokhan Memik, Gl...
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 3 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
SIGIR
2003
ACM
14 years 3 months ago
Salton Award Lecture - Information retrieval and computer science: an evolving relationship
Following the tradition of these acceptance talks, I will be giving my thoughts on where our field is going. Any discussion of the future of information retrieval (IR) research, h...
W. Bruce Croft
EUROPAR
2009
Springer
14 years 2 months ago
Automatic Calibration of Performance Models on Heterogeneous Multicore Architectures
Multicore architectures featuring specialized accelerators are getting an increasing amount of attention, and this success will probably influence the design of future High Perfor...
Cédric Augonnet, Samuel Thibault, Raymond N...