197 Hits in 7.1 sec

RePriv: Re-imagining Content Personalization and In-browser Privacy

Matthew Fredrikson, Benjamin Livshits
2011 2011 IEEE Symposium on Security and Privacy  
We present REPRIV, a system that combines the goals of privacy and content personalization in the browser.  ...  thousands of instances, and that the performance impact each case has on the browser is minimal.  ...  search personalization, Nikhil Swamy, Arjun Guha, and Jean Yang for their insights and experience with Fine, AJ Cannon and Michael Elizarov for sharing their opinions on the advantages and pitfalls of  ... 
doi:10.1109/sp.2011.37 dblp:conf/sp/FredriksonL11 fatcat:v7yobvwg5zdq3fn5be6ejjm7xq

Discovery of Potential Parallelism in Sequential Programs

Zhen Li, Ali Jannesari, Felix Wolf
2013 2013 42nd International Conference on Parallel Processing  
Rohit Atre spent much time and effort in studying computational units and static parallelism discovery methods.  ...  Unfortunately, tools that identify parallelism during compilation are usually conservative due to the lack of runtime information, and tools relying on runtime information primarily suffer from high overhead  ...  This is why static approaches are usually considered conservative in their assessment of parallelization opportunities.In contrast, dynamic methods track dependences at runtime.  ... 
doi:10.1109/icpp.2013.119 dblp:conf/icpp/LiJW13 fatcat:6dc5s2ao4rhv7avxb4oai77hoi

Fourth ACM SIGPLAN Workshop on Commercial Users of Functional Programming

Jeremy Gibbons
2007 Proceedings of the 4th ACM SIGPLAN workshop on Commercial users of functional programming - CUFP '07  
The eventual schedule included an invited talk by Xavier Leroy, eleven contributed presentations, and an energetic concluding discussion. Brief summaries of each appear below.  ...  The workshop is flourishing, having grown from an intimate gathering of 25 people in Snowbird in 2004, through 40 in Tallinn in 2005 and 57 in Portland in 2006, to 104 registered participants (and more  ...  It uses a dynamically linked runtime to generate and optimise code on the fly.  ... 
doi:10.1145/1362702.1362703 fatcat:vizu5h47d5cglnms7s3v2scrpi

Snapshot : friend or foe of data management - on optimizing transaction processing in database and blockchain systems [article]

Ankur Sharma, Universität Des Saarlandes, Universität Des Saarlandes
part of any competitor. 2 . 6 .  ...  All changes are automatically tracked and digested through SQL 99 triggers. Figures 4.6 and 4.7 show an example run of our checkpointing and recovery algorithm.  ...  Please note that this code and technology is provided for academic use only.  ... 
doi:10.22028/d291-31117 fatcat:x54iscaepfayblytjdjszmne6a

Introducing Participative Personal Assistant Teams in Negotiation Support Systems [chapter]

Eric Platon, Shinichi Honiden
2005 Lecture Notes in Computer Science  
These agents listen to the running negotiation and to each other to point out relevant information and compile advice for the user.  ...  Our future work aims at improving these mechanisms and enriching them toward a full-fledged implementation.  ...  Acknowledgement We would like to thank Nicolas Sabouret for our fruitful discussions on this research, the anonymous members of the PRIMA'04 program commitee that reviewed this paper, and the editors and  ... 
doi:10.1007/978-3-540-32128-6_14 fatcat:u5tdsnq25jfgbhmcvyx73f5qhy

RFID as an Enabler of Improved Manufacturing Performance*

Kurt Hozak, David A. Collier
2008 Decision Sciences  
Radio frequency identification (RFID) is a technology that collects data by communicating between reader devices and specials tags that are attached to (or embedded inside of) objects.  ...  In particular, all that is good about me is a reflection of my parents, Rudy and Judy Hozak. My brother, Paul Hozak, and sister, Rebecca Hozak, have been excellent role models and friends.  ...  The below summaries correspond to the key results from each hypothesis. Each summary includes one or more italicized managerial "take-aways".  ... 
doi:10.1111/j.1540-5915.2008.00214.x fatcat:pecs3cujifcw5jtnv5cnfv6wfu

Risk-based attack surface approximation

Christopher Theisen, Laurie Williams
2016 Proceedings of the Symposium and Bootcamp on the Science of Security - HotSos '16  
The same types of input and states could be correlated with input and states that result in vulnerabilities.  ...  Motivation: Security testing and reviewing efforts are a necessity for software projects, but are time-consuming and expensive to apply.  ...  Previous work with DPMs indicated that dynamic, or runtime metrics for software offered no significant advantage over static metrics in terms of defect prediction, despite providing information about how  ... 
doi:10.1145/2898375.2898388 dblp:conf/hotsos/TheisenW16 fatcat:oqksjtn4svfbpneizmaup3equ4

Using complexity to protect elections

Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
2010 Communications of the ACM  
Sound Static race analysis: The runtime overhead of race detection is directly related to the number of data variable accesses checked and synchronization events that occur.  ...  To reduce the number of accesses checked at runtime, we use static analysis at compile time to determine accesses that are guaranteed to be race free.  ...  So, the last thing you probably have on your mind is whether or not you are properly insured.  ... 
doi:10.1145/1839676.1839696 fatcat:hbqpm5boabe3jcpa4jcs7czf6y

Code Generation for Event-B [article]

Victor Rivera
2016 arXiv   pre-print
Stepwise refinement and Design-by-Contract are two formal approaches for modelling systems. These approaches are widely used in the development of systems. Both approaches have (dis-)advantages.  ...  We answer this question by translating the stepwise refinement method with Event-B to Design-by-Contract with Java and JML, so users can take full advantage of both formal approaches without losing their  ...  to simplify the task of generating a Java implementation and to take advantage of JML (semi-) automatic tools such as runtime or static assertion checkers.  ... 
arXiv:1602.02004v1 fatcat:xxpeia2gpzc5rhckllafzispqm

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  Statically the compiler knows the types and looks up the method; dynamically the lookup is at runtime.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

A Survey on Mobile Crowd-Sensing and Its Applications in the IoT Era

Khalid Abualsaud, Tarek M. Elfouly, Tamer Khattab, Elias Yaacoub, Loay Sabry Ismail, Mohamed Hossam Ahmed, Mohsen Guizani
2019 IEEE Access  
The aim of this paper is to identify and explore the new paradigm of MCS that is using smartphone for capturing and sharing the sensed data between many nodes.  ...  The existing and potential applications leveraging MCS are laid out.  ...  overhead and fast verification.  ... 
doi:10.1109/access.2018.2885918 fatcat:zpkhumhpjzbstpno24u4appmri

Java Cryptography

Jonathan Knudsen
1999 EDPACS: The EDP Audit, Control, and Security Newsletter  
It discusses authentication, key management, public and private key encryption, and includes a secure talk application that encrypts all data sent over the network.  ...  It includes thorough discussions of the package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider.  ...  You can edit a properties file, which is called static provider configuration, or you can manage providers at runtime, which is dynamic provider configuration.  ... 
doi:10.1201/1079/43250.27.4.19991001/30275.5 fatcat:exerh23znrh4rbwwwfwk3nivry

Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks

Ignacio Martin, Sebastian Troia, Jose Alberto Hernandez, Alberto Rodriguez, Francesco Musumeci, Guido Maier, Rodolfo Alvizu, Oscar Gonzalez de Dios
2019 IEEE Transactions on Network and Service Management  
its competitors in performance whilst lightweight and versatile.  ...  Instead of analyzing static code, which can be easily hindered, dynamic analysis proposes to execute samples within a controlled environment to observe malicious actions at runtime.  ... 
doi:10.1109/tnsm.2019.2927867 fatcat:or3lhqdqbnas3cztwkqr5ykhhq

A Practical Attack to De-anonymize Social Network Users

Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel
2010 2010 IEEE Symposium on Security and Privacy  
That is, rather than tracking a user's browser as with cookies, it is possible to track a person.  ...  More precisely, we show that information about the group memberships of a user (i.e., the groups of a social network to which a user belongs) is sufficient to uniquely identify this person, or, at least  ...  We also thank our shepherd Vitaly Shmatikov and the anonymous reviewers for their valuable insights and comments.  ... 
doi:10.1109/sp.2010.21 dblp:conf/sp/WondracekHKK10 fatcat:b5n6fvpsx5dgxpbvtjlwl5xnzm

Effective assignment and assistance to software developers and reviewers

Motahareh Bahrami Zanjani
2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016  
Last but not least, the extraordinary support I received from my parents, family, and friends has been the most important part of my journey throughout my graduate studies.  ...  assigning the right solution providers to the maintenance task at hand is arguably as important as providing the right tool support for it, especially in the far too commonly found state of inadequate or  ...  In summary, REVFINDER's expertise model favors breadth or generality of review contributions.  ... 
doi:10.1145/2950290.2983960 dblp:conf/sigsoft/Zanjani16 fatcat:yxc343ox3jgihevgzzcb5scuay
« Previous Showing results 1 — 15 out of 197 results