Sciweavers

1596 search results - page 288 / 320
» An Information Structural Approach to Spoken Language Genera...
Sort
View
PVLDB
2008
124views more  PVLDB 2008»
15 years 1 months ago
Google's Deep Web crawl
The Deep Web, i.e., content hidden behind HTML forms, has long been acknowledged as a significant gap in search engine coverage. Since it represents a large portion of the structu...
Jayant Madhavan, David Ko, Lucja Kot, Vignesh Gana...
EUROSYS
2007
ACM
15 years 11 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
BMCBI
2006
145views more  BMCBI 2006»
15 years 2 months ago
GEM System: automatic prototyping of cell-wide metabolic pathway models from genomes
Background: Successful realization of a "systems biology" approach to analyzing cells is a grand challenge for our understanding of life. However, current modeling appro...
Kazuharu Arakawa, Yohei Yamada, Kosaku Shinoda, Yo...
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
14 years 4 months ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...
CCS
2007
ACM
15 years 8 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...