Sciweavers

1737 search results - page 319 / 348
» Conceptual approaches for defining data, information, and kn...
Sort
View
USS
2004
14 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
CAD
2000
Springer
14 years 9 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
CIKM
2008
Springer
14 years 12 months ago
The query-flow graph: model and applications
Query logs record the queries and the actions of the users of search engines, and as such they contain valuable information about the interests, the preferences, and the behavior ...
Paolo Boldi, Francesco Bonchi, Carlos Castillo, De...
SIGIR
2008
ACM
14 years 10 months ago
Crosslingual location search
Address geocoding, the process of finding the map location for a structured postal address, is a relatively well-studied problem. In this paper we consider the more general proble...
Tanuja Joshi, Joseph Joy, Tobias Kellner, Udayan K...
ETS
2002
IEEE
155views Hardware» more  ETS 2002»
14 years 9 months ago
The experience of practitioners with technology-enhanced teaching and learning
This paper describes a research project, which seeks to showcase the experience base of practitioners with technology-enhanced teaching and learning. A particular focus of this in...
Som Naidu, David Cunnington, Carol Jasen