Sciweavers

1723 search results - page 218 / 345
» Generalized file system dependencies
Sort
View
102
Voted
KBSE
2010
IEEE
14 years 8 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
GROUP
2009
ACM
14 years 8 months ago
Social performances: understanding the motivations for online participatory behavior
"Open contribution systems" (OCS) are online applications that encourage users to contribute and share content in a "public" and open manner. While these syste...
Jude Yew
MEDES
2010
ACM
14 years 5 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
85
Voted
ANLP
2000
157views more  ANLP 2000»
14 years 11 months ago
Experiments on Sentence Boundary Detection
This paper explores the problem of identifying sentence boundaries in the transcriptions produced by automatic speech recognition systems. An experiment which determines the level...
Mark Stevenson, Robert J. Gaizauskas
PODS
2006
ACM
137views Database» more  PODS 2006»
15 years 10 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash