Sciweavers

4850 search results - page 964 / 970
» Approximate Data Structures with Applications
Sort
View
USS
2004
15 years 1 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
106
Voted
ACL
1992
15 years 27 days ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
WCE
2007
15 years 26 days ago
High energy white beam x-ray diffraction studies of residual strains in engineering components
— In order to predict the durability of engineering components and improve performance, it is mandatory to understand residual stresses. The last decade has witnessed a significa...
Shu Yan Zhang, Willem J. J. Vorster, Tea-Sung Jun,...
AAAI
2010
15 years 25 days ago
A Two-Dimensional Topic-Aspect Model for Discovering Multi-Faceted Topics
This paper presents the Topic-Aspect Model (TAM), a Bayesian mixture model which jointly discovers topics and aspects. We broadly define an aspect of a document as a characteristi...
Michael Paul, Roxana Girju
CSL
2010
Springer
15 years 25 days ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel