Sciweavers

6794 search results - page 1041 / 1359
» Semantics of Visual Languages
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 11 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
15 years 10 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
ICCS
1999
Springer
15 years 9 months ago
Conceptual Structures Represented by Conceptual Graphs and Formal Concept Analysis
Conceptual Graphs and Formal Concept Analysis have in common basic concerns: the focus on conceptual structures, the use of diagrams for supporting communication, the orientation b...
Guy W. Mineau, Gerd Stumme, Rudolf Wille
VLDB
1987
ACM
108views Database» more  VLDB 1987»
15 years 8 months ago
Translating and Optimizing SQL Queries Having Aggregates
is at least ae powerful as SQL. Two well known relational query languages that have a sound theoretical foundation are relational algebra and relational calculus. As SQL is more cl...
Günter von Bültzingsloewen
ICPW
2007
15 years 6 months ago
Mind the gap!: Transcending the tunnel view on ontology engineering
The key objective of communal knowledge sharing at the scale of the World Wide Web is the ability to collaborate and integrate within and between communities. Ontologies, being fo...
Pieter De Leenheer, Stijn Christiaens
« Prev « First page 1041 / 1359 Last » Next »