Sciweavers

950 search results - page 116 / 190
» Evaluation over thousands of queries
Sort
View
ASPLOS
2004
ACM
15 years 3 months ago
Scalable selective re-execution for EDGE architectures
Pipeline flushes are becoming increasingly expensive in modern microprocessors with large instruction windows and deep pipelines. Selective re-execution is a technique that can r...
Rajagopalan Desikan, Simha Sethumadhavan, Doug Bur...
PVLDB
2008
117views more  PVLDB 2008»
14 years 9 months ago
Learning to extract form labels
In this paper we describe a new approach to extract element labels from Web form interfaces. Having these labels is a requirement for several techniques that attempt to retrieve a...
Hoa Nguyen, Thanh Hoang Nguyen, Juliana Freire
JCDL
2011
ACM
226views Education» more  JCDL 2011»
14 years 22 days ago
Measuring historical word sense variation
We describe here a method for automatically identifying word sense variation in a dated collection of historical books in a large digital library. By leveraging a small set of kno...
David Bamman, Gregory Crane
PERVASIVE
2005
Springer
15 years 3 months ago
Towards Massively Multi-user Augmented Reality on Handheld Devices
Augmented Reality (AR) can naturally complement mobile computing on wearable devices by providing an intuitive interface to a three-dimensional information space embedded within ph...
Daniel Wagner, Thomas Pintaric, Florian Ledermann,...
DIMVA
2009
14 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...