Sciweavers

4850 search results - page 964 / 970
» Approximate Data Structures with Applications
Sort
View
USS
2004
13 years 8 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ACL
1992
13 years 8 months ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
WCE
2007
13 years 8 months ago
High energy white beam x-ray diffraction studies of residual strains in engineering components
— In order to predict the durability of engineering components and improve performance, it is mandatory to understand residual stresses. The last decade has witnessed a significa...
Shu Yan Zhang, Willem J. J. Vorster, Tea-Sung Jun,...
AAAI
2010
13 years 8 months ago
A Two-Dimensional Topic-Aspect Model for Discovering Multi-Faceted Topics
This paper presents the Topic-Aspect Model (TAM), a Bayesian mixture model which jointly discovers topics and aspects. We broadly define an aspect of a document as a characteristi...
Michael Paul, Roxana Girju
CSL
2010
Springer
13 years 8 months ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel