Sciweavers

7379 search results - page 1089 / 1476
» How Many Clusters
Sort
View
161
Voted
DL
2000
Springer
163views Digital Library» more  DL 2000»
15 years 9 months ago
Developing services for open eprint archives: globalisation, integration and the impact of links
The rapid growth of scholarly information resources available in electronic form and their organisation by digital libraries is proving fertile ground for the development of sophi...
Steve Hitchcock, Les Carr, Zhuoan Jiao, Donna Berg...
ICDE
2010
IEEE
176views Database» more  ICDE 2010»
15 years 9 months ago
Efficient fuzzy type-ahead search in TASTIER
TASTIER is a research project on the new information-access paradigm called type-ahead search, in which systems find answers to a keyword query on-the-fly as users type in the quer...
Guoliang Li, Shengyue Ji, Chen Li, Jiannan Wang, J...
149
Voted
IEEEARES
2010
IEEE
15 years 9 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
117
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
137
Voted
CHI
1999
ACM
15 years 9 months ago
Touch-Sensing Input Devices
We can touch things, and our senses tell us when our hands are touching something. But most computer input devices cannot detect when the user touches or releases the device or so...
Ken Hinckley, Mike Sinclair
« Prev « First page 1089 / 1476 Last » Next »