Sciweavers

7139 search results - page 1348 / 1428
» Language Engineering in Practice
Sort
View
CCS
2003
ACM
15 years 9 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CLEF
2003
Springer
15 years 9 months ago
Pruning Texts with NLP and Expanding Queries with an Ontology: TagSearch
: The basic line of our action is first to use natural language processing to prune the texts and the query, and secondly to use an ontology to expand the queries. Last year The sy...
Gil Francopoulo
PLDI
2010
ACM
15 years 9 months ago
Green: a framework for supporting energy-conscious programming using controlled approximation
Energy-efficient computing is important in several systems ranging from embedded devices to large scale data centers. Several application domains offer the opportunity to tradeof...
Woongki Baek, Trishul M. Chilimbi
SIGDOC
1998
ACM
15 years 8 months ago
Managing the Software Design Documents with XML
It is hard to manage the software design documents within a distributed development team. The issues include the format, distribution and evolution of data. This paper mainly focu...
Junichi Suzuki, Yoshikazu Yamamoto
POS
1998
Springer
15 years 8 months ago
Swizzle Barrier Optimizations for Orthogonal Persistence in Java
Swizzling refers to the translation of object references from an external, persistent format to an internal, transient format used during application execution. Eager swizzling sc...
Kumar Brahnmath, Nathaniel Nystrom, Antony L. Hosk...
« Prev « First page 1348 / 1428 Last » Next »