Sciweavers

37217 search results - page 7271 / 7444
» or 2010
Sort
View
ACL
2010
15 years 2 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
ACMDIS
2010
ACM
15 years 2 months ago
Design's processional character
In this paper, we examine the ideas behind and reactions to a prototype online tool designed, in-house, for an art college's interaction design department. The web-based prot...
Laurel Swan, Diana Tanase, Alex S. Taylor
ACMSE
2010
ACM
15 years 2 months ago
Adaptive stable marriage algorithms
Although it takes O(n2 ) worst-case time to solve a stable marriage problem instance with n men and n women, a trivial O(n) algorithm suffices if all men are known to have identic...
John Dabney, Brian C. Dean
ACMSE
2010
ACM
15 years 2 months ago
Visualization of the CreSIS Greenland data sets
The Center for Remote Sensing of Ice Sheets (CReSIS) has been compiling Greenland ice sheet thickness data since 1993. The airborne program utilizes a 150 MHz radar echo sounder to...
Shaketia L. McCoy, Michael Austin, Frensha Slaught...
ACSAC
2010
IEEE
15 years 2 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
« Prev « First page 7271 / 7444 Last » Next »