Sciweavers

7225 search results - page 115 / 1445
» Software is data too
Sort
View
ICAD
2004
15 years 5 months ago
The Design and Evaluation of Auditory Access to Spreadsheets
This project is concerned with the development and evaluation of an integrated approach to sound-based access to spreadsheets. The primary target user population is visually impai...
Tony Stockman
TON
2008
89views more  TON 2008»
15 years 3 months ago
Probabilistic packet marking for large-scale IP traceback
This article presents an approach to IP traceback based on the probabilistic packet marking paradigm. Our approach, which we call randomize-and-link, uses large checksum cords to &...
Michael T. Goodrich
148
Voted
CORR
2004
Springer
146views Education» more  CORR 2004»
15 years 3 months ago
Mining Frequent Itemsets from Secondary Memory
Mining frequent itemsets is at the core of mining association rules, and is by now quite well understood algorithmically for main memory databases. In this paper, we investigate a...
Gösta Grahne, Jianfei Zhu
CC
2005
Springer
15 years 9 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...
TACAS
2007
Springer
103views Algorithms» more  TACAS 2007»
15 years 10 months ago
A Reachability Predicate for Analyzing Low-Level Software
Reasoning about heap-allocated data structures such as linked lists and arrays is challenging. The reachability predicate has proved to be useful for reasoning about the heap in ty...
Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadee...