Sciweavers

505 search results - page 101 / 101
» Automatic Text Summarization in Engineering Information Mana...
Sort
View
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
13 years 9 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
CCS
2006
ACM
13 years 9 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
ASPLOS
2008
ACM
13 years 7 months ago
Hardbound: architectural support for spatial safety of the C programming language
The C programming language is at least as well known for its absence of spatial memory safety guarantees (i.e., lack of bounds checking) as it is for its high performance. C'...
Joe Devietti, Colin Blundell, Milo M. K. Martin, S...
BMCBI
2006
115views more  BMCBI 2006»
13 years 5 months ago
MitoRes: a resource of nuclear-encoded mitochondrial genes and their products in Metazoa
Background: Mitochondria are sub-cellular organelles that have a central role in energy production and in other metabolic pathways of all eukaryotic respiring cells. In the last f...
Domenico Catalano, Flavio Licciulli, Antonio Turi,...
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
11 years 7 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish