Sciweavers

120 search results - page 20 / 24
» Enabling Interactive Access to Web Tables
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
HICSS
1999
IEEE
153views Biometrics» more  HICSS 1999»
15 years 1 months ago
Search Patterns in Hypertext Exhibits
As access to hypermedia documents becomes generally available, it becomes increasingly important to understand how casual users search for information. We have studied search patt...
Joan C. Nordbotten, Svein Nordbotten
BMCBI
2007
177views more  BMCBI 2007»
14 years 9 months ago
Biowep: a workflow enactment portal for bioinformatics applications
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
70
Voted
GI
2009
Springer
14 years 7 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
66
Voted
FLAIRS
2001
14 years 11 months ago
Knowledge on Demand: Human Language Technology for Knowledge and Expertise Discovery
For several years wehave been pursuing a vision of knowledgeon demand,the ability for all users to access knowledgeregardlessof time, location, deviceor level of expertise. This p...
Mark T. Maybury