Sciweavers

931 search results - page 75 / 187
» Management of personal information scraps
Sort
View
ICSE
2008
IEEE-ACM
16 years 2 months ago
An approach to detecting duplicate bug reports using natural language and execution information
An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository...
Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu...
CIKM
2006
Springer
15 years 5 months ago
Concept-based document readability in domain specific information retrieval
Domain specific information retrieval has become in demand. Not only domain experts, but also average non-expert users are interested in searching domain specific (e.g., medical a...
Xin Yan, Dawei Song, Xue Li
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 8 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
SACMAT
2009
ACM
15 years 8 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
CIKM
1997
Springer
15 years 5 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...