Sciweavers

16968 search results - page 3365 / 3394
» Software Engineering in the Small
Sort
View
VLDB
1994
ACM
121views Database» more  VLDB 1994»
15 years 1 months ago
An Overview of Repository Technology
A repository is a shareddatabaseof information aboutengineeredartifacts.Wedefinea repository manager to be a databaseapplication that suPports checkout/checkin, version and config...
Philip A. Bernstein, Umeshwar Dayal
POPL
1989
ACM
15 years 1 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
CCS
2007
ACM
15 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
101
Voted
CF
2007
ACM
15 years 1 months ago
Parallel genomic sequence-search on a massively parallel system
In the life sciences, genomic databases for sequence search have been growing exponentially in size. As a result, faster sequencesearch algorithms to search these databases contin...
Oystein Thorsen, Brian E. Smith, Carlos P. Sosa, K...
CIVR
2010
Springer
215views Image Analysis» more  CIVR 2010»
15 years 1 months ago
Multi modal semantic indexing for image retrieval
Popular image retrieval schemes generally rely only on a single mode, (either low level visual features or embedded text) for searching in multimedia databases. Many popular image...
Chandrika Pulla, C. V. Jawahar
« Prev « First page 3365 / 3394 Last » Next »