Sciweavers

409 search results - page 65 / 82
» Review spam detection
Sort
View
CISIS
2008
IEEE
15 years 1 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...
CCE
2004
14 years 11 months ago
An online application of dynamic PLS to a dearomatization process
Early detection of process disturbances and prediction of malfunctions in process equipment improve the safety of the process, minimize the time and resources needed for maintenan...
Tiina Komulainen, Mauri Sourander, Sirkka-Liisa J&...
SIGIR
2012
ACM
13 years 2 months ago
Ousting ivory tower research: towards a web framework for providing experiments as a service
With its close ties to the Web, the IR community is destined to leverage the dissemination and collaboration capabilities that the Web provides today. Especially with the advent o...
Tim Gollub, Benno Stein, Steven Burrows
CVPR
2012
IEEE
13 years 2 months ago
Icon scanning: Towards next generation QR codes
Undoubtedly, a key feature in the popularity of smartmobile devices is the numerous applications one can install. Frequently, we learn about an application we desire by seeing it ...
Itamar Friedman, Lihi Zelnik-Manor
SIGSOFT
1995
ACM
15 years 3 months ago
An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development
—We conducted a long-term experiment to compare the costs and benefits of several different software inspection methods. These methods were applied by professional developers to ...
Adam A. Porter, Harvey P. Siy, Carol A. Toman, Law...