Sciweavers

8503 search results - page 1406 / 1701
» Secure Software Architectures
Sort
View
101
Voted
DAC
2003
ACM
16 years 4 months ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
195
Voted
DAC
2005
ACM
16 years 4 months ago
Towards scalable flow and context sensitive pointer analysis
Pointer analysis, a classic problem in software program analysis, has emerged as an important problem to solve in design automation, at a time when complex designs, specified in t...
Jianwen Zhu
120
Voted
WWW
2008
ACM
16 years 4 months ago
An initial investigation on evaluating semantic web instance data
Many emerging semantic web applications include ontologies from one set of authors and instance data from another (often much larger) set of authors. Often ontologies are reused a...
Li Ding, Jiao Tao, Deborah L. McGuinness
129
Voted
WWW
2008
ACM
16 years 4 months ago
Temporal views over rdf data
Supporting fast access to large RDF stores has been one of key challenges for enabling use of the Semantic Web in real-life applications, more so in sensor-based systems where lar...
Craig Sayers, Geetha Manjunath, K. S. Venugopal, R...
108
Voted
WWW
2007
ACM
16 years 4 months ago
Parallel crawling for online social networks
Given a huge online social network, how do we retrieve information from it through crawling? Even better, how do we improve the crawling performance by using parallel crawlers tha...
Duen Horng Chau, Shashank Pandit, Samuel Wang, Chr...
« Prev « First page 1406 / 1701 Last » Next »