Sciweavers

1489 search results - page 228 / 298
» The First Bug Report
Sort
View
135
Voted
DSN
2004
IEEE
15 years 8 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
IEAAIE
2000
Springer
15 years 8 months ago
Maintenance of KBS's by Domain Experts: The Holy Grail in Practice
Enabling a domain expert to maintain his own knowledge in a Knowledge Based System has long been an ideal for the Knowledge Engineering community. In this paper we report on our ex...
Arne Bultmann, Joris Kuipers, Frank van Harmelen
128
Voted
ANCS
2008
ACM
15 years 6 months ago
A remotely accessible network processor-based router for network experimentation
Over the last decade, programmable Network Processors (NPs) have become widely used in Internet routers and other network components. NPs enable rapid development of complex packe...
Charlie Wiseman, Jonathan S. Turner, Michela Becch...
CIKM
2008
Springer
15 years 6 months ago
Identifying table boundaries in digital documents via sparse line detection
Most prior work on information extraction has focused on extracting information from text in digital documents. However, often, the most important information being reported in an...
Ying Liu, Prasenjit Mitra, C. Lee Giles
144
Voted
CIKM
2008
Springer
15 years 6 months ago
How should users access the content of digital books?
I report briefly on some of my own work in each of these areas and elucidate some of the questions that this research has raised. Then I propose as a research agenda the developme...
Nina Wacholder