Sciweavers

4553 search results - page 679 / 911
» Distributed Ranked Search
Sort
View
109
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Automatic generation of suggestions for program investigation
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to...
Martin P. Robillard
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
108
Voted
ISBI
2008
IEEE
16 years 4 months ago
Integrated profiling of cell surface protein and nuclear marker for discriminant analysis
Cell membrane proteins play an important role in tissue architecture and cell-cell communication. We hypothesize that segmentation and multivariate characterization of the distrib...
Ju Han, Hang Chang, Kumari L. Andarawewa, Paul Yas...
107
Voted
WWW
2007
ACM
16 years 4 months ago
Discovering the best web service
Major research challenges in discovering Web services include, provisioning of services across multiple or heterogeneous registries, differentiating between services that share si...
Eyhab Al-Masri, Qusay H. Mahmoud
147
Voted
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
16 years 3 months ago
Dynamic hybrid clustering of bioinformatics by incorporating text mining and citation analysis
To unravel the concept structure and dynamics of the bioinformatics field, we analyze a set of 7401 publications from the Web of Science and MEDLINE databases, publication years 1...
Bart De Moor, Frizo A. L. Janssens, Wolfgang Gl&au...