Sciweavers

3686 search results - page 645 / 738
» Comprehensive comprehensions
Sort
View
AOSD
2007
ACM
15 years 5 months ago
Using natural language program analysis to locate and understand action-oriented concerns
Most current software systems contain undocumented high-level ideas implemented across multiple files and modules. When developers perform program maintenance tasks, they often wa...
David Shepherd, Zachary P. Fry, Emily Hill, Lori L...
130
Voted
CIKM
2007
Springer
15 years 5 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
CONEXT
2007
ACM
15 years 5 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
15 years 5 months ago
Connected substructure similarity search
Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical com...
Haichuan Shang, Xuemin Lin, Ying Zhang, Jeffrey Xu...
104
Voted
ELPUB
2007
ACM
15 years 5 months ago
The Project of the Italian Culture Portal and its Development. A Case Study: Designing a Dublin Core Application Profile for Int
In September 2004 the Italian Ministry of Cultural Heritage and Activities (MiBAC) committed to Scuola Normale Superiore di Pisa (SNS) the scientific and technical project for the...
Irene Buonazia, Maria Emilia Masci, Davide Merlitt...