Sciweavers

2335 search results - page 448 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
WWW
2010
ACM
15 years 6 months ago
Exploring web scale language models for search query processing
It has been widely observed that search queries are composed in a very different style from that of the body or the title of a document. Many techniques explicitly accounting for...
Jian Huang 0002, Jianfeng Gao, Jiangbo Miao, Xiaol...
SIGIR
1993
ACM
15 years 3 months ago
Development of a Modern OPAC: From REVTOLC to MARIAN
Since 1986 we have investigated the problems and possibilities of applying modern information retrieval methods to large online public access library catalogs (OPACs). In the Retr...
Edward A. Fox, Robert K. France, Eskinder Sahle, A...
CCGRID
2008
IEEE
15 years 6 months ago
Pastel: Bridging the Gap between Structured and Large-State Overlays
Peer-to-peer overlays envision a single overlay substrate that can be used (possibly simultaneously) by many applications, but current overlays either target fast, few-hop lookups...
Nuno Cruces, Rodrigo Rodrigues, Paulo Ferreira
MSR
2005
ACM
15 years 5 months ago
Towards a taxonomy of approaches for mining of source code repositories
Source code version repositories provide a treasure of information encompassing the changes introduced in the system throughout its evolution. These repositories are typically man...
Huzefa H. Kagdi, Michael L. Collard, Jonathan I. M...
81
Voted
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 4 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...