Sciweavers

6171 search results - page 1187 / 1235
» The FrameNet Data and Software
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
CLUSTER
2005
IEEE
14 years 1 months ago
Memory Management Support for Multi-Programmed Remote Direct Memory Access (RDMA) Systems
Current operating systems offer basic support for network interface controllers (NICs) supporting remote direct memory access (RDMA). Such support typically consists of a device d...
Kostas Magoutis
MICRO
2005
IEEE
133views Hardware» more  MICRO 2005»
14 years 1 months ago
Wish Branches: Combining Conditional Branching and Predication for Adaptive Predicated Execution
Predicated execution has been used to reduce the number of branch mispredictions by eliminating hard-to-predict branches. However, the additional instruction overhead and addition...
Hyesoon Kim, Onur Mutlu, Jared Stark, Yale N. Patt
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
14 years 1 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
PLDI
2005
ACM
14 years 1 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
« Prev « First page 1187 / 1235 Last » Next »