Sciweavers

8503 search results - page 1406 / 1701
» Secure Software Architectures
Sort
View
DAC
2003
ACM
16 years 1 months ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
DAC
2005
ACM
16 years 1 months ago
Towards scalable flow and context sensitive pointer analysis
Pointer analysis, a classic problem in software program analysis, has emerged as an important problem to solve in design automation, at a time when complex designs, specified in t...
Jianwen Zhu
WWW
2008
ACM
16 years 1 months ago
An initial investigation on evaluating semantic web instance data
Many emerging semantic web applications include ontologies from one set of authors and instance data from another (often much larger) set of authors. Often ontologies are reused a...
Li Ding, Jiao Tao, Deborah L. McGuinness
110
Voted
WWW
2008
ACM
16 years 1 months ago
Temporal views over rdf data
Supporting fast access to large RDF stores has been one of key challenges for enabling use of the Semantic Web in real-life applications, more so in sensor-based systems where lar...
Craig Sayers, Geetha Manjunath, K. S. Venugopal, R...
80
Voted
WWW
2007
ACM
16 years 1 months ago
Parallel crawling for online social networks
Given a huge online social network, how do we retrieve information from it through crawling? Even better, how do we improve the crawling performance by using parallel crawlers tha...
Duen Horng Chau, Shashank Pandit, Samuel Wang, Chr...
« Prev « First page 1406 / 1701 Last » Next »