Sciweavers

414 search results - page 82 / 83
» Transforming Data from DataPile Structure into RDF
Sort
View
SIGSOFT
2007
ACM
14 years 7 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
SIGMOD
2004
ACM
142views Database» more  SIGMOD 2004»
14 years 6 months ago
Understanding Web Query Interfaces: Best-Effort Parsing with Hidden Syntax
Recently, the Web has been rapidly "deepened" by many searchable databases online, where data are hidden behind query forms. For modelling and integrating Web databases,...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
SAC
2005
ACM
13 years 11 months ago
Graphical rule-based representation of signal-transduction networks
The process by which a cell senses and responds to its environment, as in signal transduction, is often mediated by a network of protein-protein interactions, in which proteins co...
James R. Faeder, Michael L. Blinov, William S. Hla...
CCS
2004
ACM
13 years 11 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
13 years 11 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang