Sciweavers

17390 search results - page 3300 / 3478
» Distributed Data Clustering
Sort
View
SIGSOFT
2005
ACM
16 years 2 months ago
Facilitating software evolution research with kenyon
Software evolution research inherently has several resourceintensive logistical constraints. Archived project artifacts, such as those found in source code repositories and bug tr...
Jennifer Bevan, E. James Whitehead Jr., Sunghun Ki...
SIGSOFT
2003
ACM
16 years 2 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ISBI
2002
IEEE
16 years 2 months ago
Correction for external LOR effects in listmode reconstruction for PET
In PET imaging listmode is an alternative for projections to store the acquisition data with more accuracy. The reconstruction starting from the listmode format requires different...
Stefaan Vandenberghe, Yves D'Asseler, Rik Van de W...
WWW
2007
ACM
16 years 2 months ago
Discovering the best web service
Major research challenges in discovering Web services include, provisioning of services across multiple or heterogeneous registries, differentiating between services that share si...
Eyhab Al-Masri, Qusay H. Mahmoud
108
Voted
WWW
2007
ACM
16 years 2 months ago
Crawling multiple UDDI business registries
As Web services proliferate, size and magnitude of UDDI Business Registries (UBRs) are likely to increase. The ability to discover Web services of interest then across multiple UB...
Eyhab Al-Masri, Qusay H. Mahmoud
« Prev « First page 3300 / 3478 Last » Next »