Sciweavers

668 search results - page 60 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
IJSI
2008
115views more  IJSI 2008»
14 years 9 months ago
Towards Knowledge Acquisition from Semi-Structured Content
Abstract A rich family of generic Information Extraction (IE) techniques have been developed by researchers nowadays. This paper proposes WebKER, a system for automatically extract...
Xi Bai, Jigui Sun, Haiyan Che, Lian Shi
PLDI
2005
ACM
15 years 3 months ago
Programming by sketching for bit-streaming programs
This paper introduces the concept of programming with sketches, an approach for the rapid development of high-performance applications. This approach allows a programmer to write ...
Armando Solar-Lezama, Rodric M. Rabbah, Rastislav ...
DIMVA
2010
14 years 11 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
MSR
2009
ACM
15 years 2 months ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk
CIKM
2006
Springer
15 years 1 months ago
Cache-oblivious nested-loop joins
We propose to adapt the newly emerged cache-oblivious model to relational query processing. Our goal is to automatically achieve an overall performance comparable to that of fine-...
Bingsheng He, Qiong Luo