Sciweavers

5843 search results - page 1165 / 1169
» Software Security in Practice
Sort
View
PUC
2007
152views more  PUC 2007»
13 years 7 months ago
Back to the shed: gendered visions of technology and domesticity
One of the tropes of the age of ubiquitous computing is the migration of computation into new spaces. Domestic environments have been a particular focus of attention for many. Howe...
Genevieve Bell, Paul Dourish
SCP
2010
155views more  SCP 2010»
13 years 6 months ago
Type inference and strong static type checking for Promela
The SPIN model checker and its specification language Promela have been used extensively in industry and academia to check logical properties of distributed algorithms and protoc...
Alastair F. Donaldson, Simon J. Gay
CEC
2010
IEEE
13 years 5 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben
CONEXT
2010
ACM
13 years 5 months ago
Optimal content placement for a large-scale VoD system
IPTV service providers offering Video-on-Demandcurrently use servers at each metropolitan office to store all the videos in their library. With the rapid increase in library sizes...
David Applegate, Aaron Archer, Vijay Gopalakrishna...
FAST
2009
13 years 5 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
« Prev « First page 1165 / 1169 Last » Next »