Sciweavers

5254 search results - page 918 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
PPOPP
2006
ACM
14 years 4 months ago
Predicting bounds on queuing delay for batch-scheduled parallel machines
Most space-sharing parallel computers presently operated by high-performance computing centers use batch-queuing systems to manage processor allocation. In many cases, users wishi...
John Brevik, Daniel Nurmi, Richard Wolski
SAC
2006
ACM
14 years 4 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
UIST
2006
ACM
14 years 4 months ago
Interactive environment-aware display bubbles
Interactive environment-aware display bubbles have been introduced in a novel display metaphor [3] which allows screens to be instantiated with a freeform shape anywhere on demand...
Daniel Cotting, Markus H. Gross
ACSAC
2005
IEEE
14 years 3 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
DSN
2005
IEEE
14 years 3 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion