Sciweavers

2499 search results - page 396 / 500
» The Serializability of Network Codes
Sort
View
150
Voted
EUROSYS
2006
ACM
16 years 25 days ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
127
Voted
CSCW
2010
ACM
16 years 18 days ago
Is it really about me?: message content in social awareness streams
In this work we examine the characteristics of social activity and patterns of communication on Twitter, a prominent example of the emerging class of communication systems we call...
Mor Naaman, Jeffrey Boase, Chih-Hui Lai
AINA
2009
IEEE
15 years 10 months ago
CUTER: An Efficient Useful Text Extraction Mechanism
In this paper we present CUTER, a system that processes HTML pages in order to extract the useful text from them. The mechanism is focalized on HTML pages that include news articl...
George Adam, Christos Bouras, Vassilis Poulopoulos
151
Voted
ICS
2009
Tsinghua U.
15 years 10 months ago
Dynamic topology aware load balancing algorithms for molecular dynamics applications
Molecular Dynamics applications enhance our understanding of biological phenomena through bio-molecular simulations. Large-scale parallelization of MD simulations is challenging b...
Abhinav Bhatele, Laxmikant V. Kalé, Sameer ...
117
Voted
DSN
2009
IEEE
15 years 10 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea