Sciweavers

584 search results - page 44 / 117
» Pattern Matching In The Textract Information Extraction Syst...
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 4 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
CASCON
1997
96views Education» more  CASCON 1997»
14 years 11 months ago
The role of a GUI in the creation of a trainable message understanding system
The explosion in the amount of free text materials on the Internet, and the use of this information by people from all walks of life, has made the issue of generalized information...
Amit Bagga
EWSN
2008
Springer
15 years 9 months ago
Discovery of Frequent Distributed Event Patterns in Sensor Networks
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
Kay Römer
DIAL
2004
IEEE
164views Image Analysis» more  DIAL 2004»
15 years 1 months ago
A Dynamic Feature Generation System for Automated Metadata Extraction in Preservation of Digital Materials
Obsolescence in storage media and the hardware and software for access and use can render old electronic files inaccessible and unusable. Therefore, the long-term preservation of ...
Song Mao, Jongwoo Kim, George R. Thoma