Sciweavers

9842 search results - page 1645 / 1969
» Compositional timing analysis
Sort
View
DIMVA
2007
15 years 5 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter
LREC
2010
138views Education» more  LREC 2010»
15 years 5 months ago
Studying the Lexicon of Dialogue Acts
Dialogue Acts have been well studied in linguistics and attracted computational linguistics research for a long time: they constitute the basis of everyday conversations and can b...
Nicole Novielli, Carlo Strapparava
LREC
2010
144views Education» more  LREC 2010»
15 years 5 months ago
Evaluating Complex Semantic Artifacts
Evaluating complex Natural Language Processing (NLP) systems can prove extremely difficult. In many cases, the best one can do is to evaluate these systems indirectly, by looking ...
Christopher R. Walker, Hannah Copperman
MASCOTS
2010
15 years 5 months ago
Efficient Discovery of Loop Nests in Execution Traces
Execution and communication traces are central to performance modeling and analysis. Since the traces can be very long, meaningful compression and extraction of representative beha...
Qiang Xu, Jaspal Subhlok, Nathaniel Hammen
NETWORKING
2010
15 years 5 months ago
Efficient Recovery from False State in Distributed Routing Algorithms
Abstract--Malicious and misconfigured nodes can inject incorrect state into a distributed system, which can then be propagated system-wide as a result of normal network operation. ...
Daniel Gyllstrom, Sudarshan Vasudevan, Jim Kurose,...
« Prev « First page 1645 / 1969 Last » Next »