Sciweavers

1995 search results - page 115 / 399
» What's the Problem
Sort
View
ESORICS
2011
Springer
14 years 3 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
126
Voted
CHI
2010
ACM
15 years 10 months ago
How power users help and hinder open bug reporting
Many power users that contribute to open source projects have no intention of becoming regular contributors; they just want a bug fixed or a feature implemented. How often do thes...
Andrew J. Ko, Parmit K. Chilana
73
Voted
CHI
2010
ACM
15 years 9 months ago
Occlusion-aware interfaces
We define occlusion-aware interfaces as interaction techniques which know what area of the display is currently occluded, and use this knowledge to counteract potential problems a...
Daniel Vogel, Ravin Balakrishnan
117
Voted
ESCIENCE
2006
IEEE
15 years 7 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
119
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Information Survival Threshold in Sensor and P2P Networks
— Consider a network of, say, sensors, or P2P nodes, or bluetooth-enabled cell-phones, where nodes transmit information to each other and where links and nodes can go up or down....
Deepayan Chakrabarti, Jure Leskovec, Christos Falo...