Sciweavers

524 search results - page 12 / 105
» Why phishing works
Sort
View
SAINT
2006
IEEE
14 years 2 months ago
Fair Overload Handling Using Proof-of-Work Functions
Overload can reduce the overall performance of a computer system up to a point where the whole service might collapse. Thus, for example the load on a server must be controlled to...
Sebastian Golze, Gero Mühl
ISCA
1998
IEEE
142views Hardware» more  ISCA 1998»
14 years 21 days ago
An Analysis of Correlation and Predictability: What Makes Two-Level Branch Predictors Work
Pipeline flushes due to branch mispredictions is one of the most serious problems facing the designer of a deeply pipelined, superscalar processor. Many branch predictors have bee...
Marius Evers, Sanjay J. Patel, Robert S. Chappell,...
WSC
2007
13 years 10 months ago
Work smarter, not harder: guidelines for designing simulation experiments
We present the basic concepts of experimental design, the types of goals it can address, and why it is such an important and useful tool for simulation. A well-designed experiment...
Susan M. Sanchez
SIGMOD
2006
ACM
162views Database» more  SIGMOD 2006»
14 years 8 months ago
Adaptive query processing: why, how, when, what next
Adaptive query processing has been the subject of a great deal of recent work, particularly in emerging data management environments such as data integration and data streams. We ...
Amol Deshpande, Joseph M. Hellerstein, Vijayshanka...
CHI
2009
ACM
13 years 11 months ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng