Sciweavers

1575 search results - page 237 / 315
» Simultaneous Source Location
Sort
View
139
Voted
WCRE
2005
IEEE
15 years 9 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
131
Voted
MSR
2005
ACM
15 years 9 months ago
Using a clone genealogy extractor for understanding and supporting evolution of code clones
Programmers often create similar code snippets or reuse existing code snippets by copying and pasting. Code clones —syntactically and semantically similar code snippets—can ca...
Miryung Kim, David Notkin
136
Voted
CAISE
2005
Springer
15 years 9 months ago
Bridging Relational Databases to Context-Aware Services
The provision of context-aware services in terms of the anytime/anywhere/anymedia paradigm requires the consideration of certain context properties in terms of time, location, devi...
Elisabeth Kapsammer, Wieland Schwinger, Werner Ret...
123
Voted
EGC
2005
Springer
15 years 9 months ago
Fault Tolerance in the R-GMA Information and Monitoring System
R-GMA (Relational Grid Monitoring Architecture) [1] is a grid monitoring and information system that provides a global view of data distributed across a grid system. R-GMA creates ...
Rob Byrom, Brian A. Coghlan, Andrew W. Cooke, Rone...
92
Voted
LOCA
2005
Springer
15 years 9 months ago
Web-Enhanced GPS
Location-based services like reminders, electronic graffiti, and tourist guides normally require a custom, location-sensitive database that must be custom-tailored for the applicat...
Ramaswamy Hariharan, John Krumm, Eric Horvitz