Sciweavers

474 search results - page 86 / 95
» A Framework for Comparing Type Systems for Database Programm...
Sort
View
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 8 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
CIKM
1999
Springer
14 years 1 months ago
Rule-Based Query Optimization, Revisited
We present the architecture and a performance assessment of an extensible query optimizer written in Venus. Venus is a general-purpose active-database rule language embedded in C+...
Lane Warshaw, Daniel P. Miranker
BMCBI
2008
147views more  BMCBI 2008»
13 years 8 months ago
Assessment of disease named entity recognition on a corpus of annotated sentences
Background: In recent years, the recognition of semantic types from the biomedical scientific literature has been focused on named entities like protein and gene names (PGNs) and ...
Antonio Jimeno-Yepes, Ernesto Jiménez-Ruiz,...
TREC
2001
13 years 10 months ago
Oracle at TREC 10: Filtering and Question-Answering
: Oracle's objective in TREC-10 was to study the behavior of Oracle information retrieval in previously unexplored application areas. The software used was Oracle9i Text[1], O...
Shamin Alpha, Paul Dixon, Ciya Liao, Changwen Yang