Sciweavers

2654 search results - page 494 / 531
» Accessing the deep web
Sort
View
ACSAC
2004
IEEE
15 years 2 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
CBSE
2006
Springer
15 years 2 months ago
Generic Component Lookup
The possibilities currently offered to conduct business at an electronic level are immense. Service providers offer access to their attendances through components placed on the Int...
Till G. Bay, Patrick Th. Eugster, Manuel Oriol
ERCIMDL
2000
Springer
185views Education» more  ERCIMDL 2000»
15 years 2 months ago
CORC: Helping Libraries Take a Leading Role in the Digital Age
The OCLC Cooperative Online Resource Catalog is helping librarians thrive in the digital age. Librarians are using CORC to select, describe, maintain, and provide guided access to ...
Kay Covert
CCGRID
2006
IEEE
15 years 1 months ago
Biodiversity World: A Problem-Solving Environment for Analysing Biodiversity Patterns
In the Biodiversity World (BDW) project we have created a flexible and extensible Web Services-based Grid environment for biodiversity researchers to solve problems in biodiversity...
Jaspreet Singh Pahwa, Peter Brewer, Tim Sutton, Ch...
DLOG
2004
15 years 13 days ago
Towards Explaining Semantic Matching
Interoperability among systems using different term vocabularies requires mappings between them. Matching applications generate these mappings. When the matching process utilizes ...
Deborah L. McGuinness, Pavel Shvaiko, Fausto Giunc...