Sciweavers

436 search results - page 61 / 88
» On two variations of identifying codes
Sort
View
ICDE
2010
IEEE
224views Database» more  ICDE 2010»
15 years 9 months ago
Probabilistic Declarative Information Extraction
Abstract-Unstructured text represents a large fraction of the world's data. It often contain snippets of structured information within them (e.g., people's names and zip ...
Daisy Zhe Wang, Eirinaios Michelakis, Joseph M. He...
ISSTA
2009
ACM
15 years 4 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
PLDI
1998
ACM
15 years 2 months ago
Exploiting Idle Floating-Point Resources for Integer Execution
In conventional superscalar microarchitectures with partitioned integer and floating-point resources, all floating-point resources are idle during execution of integer programs....
S. Subramanya Sastry, Subbarao Palacharla, James E...
SIGCSE
2008
ACM
131views Education» more  SIGCSE 2008»
14 years 9 months ago
Compiler error messages: what can help novices?
Novices find it difficult to understand and use compiler error messages. It is useful to refine this observation and study the effect of different message styles on how well and q...
Marie-Hélène Nienaltowski, Michela P...
CORR
2011
Springer
184views Education» more  CORR 2011»
14 years 4 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom