Sciweavers

557 search results - page 12 / 112
» Two experiences designing for effective security
Sort
View
ISPASS
2007
IEEE
14 years 2 months ago
A Comparison of Two Approaches to Parallel Simulation of Multiprocessors
— The design trend towards CMPs has made the simulation of multiprocessor systems a necessity and has also made multiprocessor systems widely available. While a serial multiproce...
Andrew Over, Bill Clarke, Peter E. Strazdins
BMCBI
2008
125views more  BMCBI 2008»
13 years 8 months ago
MAID : An effect size based model for microarray data integration across laboratories and platforms
Background: Gene expression profiling has the potential to unravel molecular mechanisms behind gene regulation and identify gene targets for therapeutic interventions. As microarr...
Ivan Borozan, Limin Chen, Bryan Paeper, Jenny E. H...
PLDI
2004
ACM
14 years 2 months ago
Cost effective dynamic program slicing
Although dynamic program slicing was first introduced to aid in user level debugging, applications aimed at improving software quality, reliability, security, and performance hav...
Xiangyu Zhang, Rajiv Gupta
CHI
2007
ACM
14 years 9 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
CHI
2005
ACM
14 years 9 months ago
Tool for accurately predicting website navigation problems, non-problems, problem severity, and effectiveness of repairs
The Cognitive Walkthrough for the Web (CWW) is a partially automated usability evaluation method for identifying and repairing website navigation problems. Building on five earlie...
Marilyn Hughes Blackmon, Muneo Kitajima, Peter G. ...