Sciweavers

229 search results - page 45 / 46
» A General Name Binding Mechanism
Sort
View
ISSTA
2010
ACM
14 years 13 days ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
CIKM
2004
Springer
14 years 8 days ago
Efficient processing of XML twig patterns with parent child edges: a look-ahead approach
With the growing importance of semi-structure data in information exchange, much research has been done to provide an effective mechanism to match a twig query in an XML database....
Jiaheng Lu, Ting Chen, Tok Wang Ling
CCS
2006
ACM
14 years 8 days ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
BMCBI
2006
150views more  BMCBI 2006»
13 years 8 months ago
CGAT: a comparative genome analysis tool for visualizing alignments in the analysis of complex evolutionary changes between clos
Background: The recent accumulation of closely related genomic sequences provides a valuable resource for the elucidation of the evolutionary histories of various organisms. Howev...
Ikuo Uchiyama, Toshio Higuchi, Ichizo Kobayashi
ADHOC
2005
119views more  ADHOC 2005»
13 years 8 months ago
A link-indexed statistical traffic prediction approach to improving IEEE 802.11 PSM
Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the t...
Chunyu Hu, Jennifer C. Hou