Sciweavers

6014 search results - page 1159 / 1203
» Trends in High Performance Computing
Sort
View
SIGSOFT
2004
ACM
14 years 9 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
WWW
2009
ACM
14 years 9 months ago
How much can behavioral targeting help online advertising?
Behavioral Targeting (BT) is a technique used by online advertisers to increase the effectiveness of their campaigns, and is playing an increasingly important role in the online a...
Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang...
ASPLOS
2009
ACM
14 years 9 months ago
Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging
Software defects, commonly known as bugs, present a serious challenge for system reliability and dependability. Once a program failure is observed, the debugging activities to loc...
Martin Dimitrov, Huiyang Zhou
KDD
2009
ACM
245views Data Mining» more  KDD 2009»
14 years 9 months ago
Mining rich session context to improve web search
User browsing information, particularly their non-search related activity, reveals important contextual information on the preferences and the intent of web users. In this paper, ...
Guangyu Zhu, Gilad Mishne
MOBISYS
2009
ACM
14 years 9 months ago
A framework of energy efficient mobile sensing for automatic user state recognition
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based se...
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacob...
« Prev « First page 1159 / 1203 Last » Next »