Sciweavers

2271 search results - page 327 / 455
» Scalable Software Libraries
Sort
View
140
Voted
WCRE
2005
IEEE
15 years 9 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
145
Voted
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 9 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
135
Voted
CASC
2005
Springer
113views Mathematics» more  CASC 2005»
15 years 9 months ago
Real Solving of Bivariate Polynomial Systems
Abstract. We propose exact, complete and efficient methods for 2 problems: First, the real solving of systems of two bivariate rational polynomials of arbitrary degree. This means ...
Ioannis Z. Emiris, Elias P. Tsigaridas
127
Voted
CC
2005
Springer
120views System Software» more  CC 2005»
15 years 9 months ago
Data Slicing: Separating the Heap into Independent Regions
In this paper, we present a formal description of data slicing, which is a type-directed program transformation technique that separates a program’s heap into several independent...
Jeremy Condit, George C. Necula
126
Voted
CLEF
2005
Springer
15 years 9 months ago
Exploiting Linguistic Indices and Syntactic Structures for Multilingual Question Answering: ITC-irst at CLEF 2005
This year we participated at 4 Question Answering tasks at CLEF: the Italian monolingual (I), Italian-English (I/E), Bulgarian monolingual (B), and Bulgarian-English (B/E) bilingu...
Hristo Tanev, Milen Kouylekov, Bernardo Magnini, M...