Sciweavers

SAC
2009
ACM
14 years 6 months ago
Defending online reputation systems against collaborative unfair raters through signal modeling and trust
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...
Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang
SAC
2009
ACM
14 years 6 months ago
Bayesian bot detection based on DNS traffic similarity
Ricardo Villamarín-Salomón, Jos&eacu...
SAC
2009
ACM
14 years 6 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
SAC
2009
ACM
14 years 6 months ago
Celling SHIM: compiling deterministic concurrency to a heterogeneous multicore
Parallel architectures are the way of the future, but are notoriously difficult to program. In addition to the low-level constructs they often present (e.g., locks, DMA, and non-...
Nalini Vasudevan, Stephen A. Edwards
SAC
2009
ACM
14 years 6 months ago
HIVSetSubtype: software for subtype classification of HIV-1 sequences
An automated web based tool for assigning HIV-1 pure and recombinant subtypes within unaligned sequences is presented. The system combines the BLAST search algorithm and the recom...
Luciano Vieira de Araújo, Sabri S. Sanabani...
SAC
2009
ACM
14 years 6 months ago
An implementation substrate for languages composing modularized crosscutting concerns
We present the implementation of several programming languages with support for multi-dimensional separation of concerns (MDSOC) on top of a common delegation-based substrate, whi...
Hans Schippers, Michael Haupt, Robert Hirschfeld
SAC
2009
ACM
14 years 6 months ago
Length-lex bound consistency for knapsack constraints
This paper considers the length-lex domain for set-variables in constraint programming which includes not only membership but also cardinality and lexicographic information. The p...
Justin Yip, Pascal Van Hentenryck
SAC
2009
ACM
14 years 6 months ago
A flexible QoS-aware routing protocol for infrastructure-less B3G networks
Current mobile devices support multiple network technologies and network composition via such devices can enable service provisioning across heterogeneous networks. One of the key...
Natallia Kokash, Roberto Speicys Cardoso, Pierre-G...
SAC
2009
ACM
14 years 6 months ago
Topology determination and isolation for implicit plane curves
A method is proposed to generate an isolation for a plane curve, which is a set of boxes covering the curve, having the same topology as the curve, and approximating the curve to a...
Jin-San Cheng, Xiao-Shan Gao, Jia Li
SAC
2009
ACM
14 years 6 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...