Sciweavers

4323 search results - page 651 / 865
» Callback Implementations in C
Sort
View
CIKM
2010
Springer
15 years 2 months ago
Components for information extraction: ontology-based information extractors and generic platforms
Information Extraction (IE) has existed as a field for several decades and has produced some impressive systems in the recent past. Despite its success, widespread usage and comm...
Daya C. Wimalasuriya, Dejing Dou
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 2 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
CP
2010
Springer
15 years 2 months ago
Generating Special-Purpose Stateless Propagators for Arbitrary Constraints
Given an arbitrary constraint c on n variables with domain size d, we show how to generate a custom propagator that establishes GAC in time O(nd) by precomputing the propagation th...
Ian P. Gent, Christopher Jefferson, Ian Miguel, Pe...
INFOCOM
2010
IEEE
15 years 2 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
137
Voted
SIAMDM
2008
105views more  SIAMDM 2008»
15 years 2 months ago
A Simple Linear Time LexBFS Cograph Recognition Algorithm
Recently lexicographic breadth first search (LexBFS) has been shown to be a very powerful tool for the development of linear time, easily implementable recognition algorithms for v...
Anna Bretscher, Derek G. Corneil, Michel Habib, Ch...