Sciweavers

226 search results - page 43 / 46
» Enabling Ontology-Based Access to Streaming Data Sources
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
ASPLOS
2008
ACM
14 years 11 months ago
Hardbound: architectural support for spatial safety of the C programming language
The C programming language is at least as well known for its absence of spatial memory safety guarantees (i.e., lack of bounds checking) as it is for its high performance. C'...
Joe Devietti, Colin Blundell, Milo M. K. Martin, S...
CACM
2000
225views more  CACM 2000»
14 years 9 months ago
Complementary Video and Audio Analysis for Broadcast News Archives
The Informedia Digital Video Library system extracts information from digitized video sources and allows full content search and retrieval over all extracted data. This extracted ...
Howard D. Wactlar, Alexander G. Hauptmann, Michael...
BMCBI
2010
155views more  BMCBI 2010»
14 years 9 months ago
A flexible R package for nonnegative matrix factorization
Background: Nonnegative Matrix Factorization (NMF) is an unsupervised learning technique that has been applied successfully in several fields, including signal processing, face re...
Renaud Gaujoux, Cathal Seoighe
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
15 years 2 months ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano