Sciweavers

120 search results - page 20 / 24
» Enabling Interactive Access to Web Tables
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
HICSS
1999
IEEE
153views Biometrics» more  HICSS 1999»
13 years 11 months ago
Search Patterns in Hypertext Exhibits
As access to hypermedia documents becomes generally available, it becomes increasingly important to understand how casual users search for information. We have studied search patt...
Joan C. Nordbotten, Svein Nordbotten
BMCBI
2007
177views more  BMCBI 2007»
13 years 7 months ago
Biowep: a workflow enactment portal for bioinformatics applications
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
GI
2009
Springer
13 years 5 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
FLAIRS
2001
13 years 8 months ago
Knowledge on Demand: Human Language Technology for Knowledge and Expertise Discovery
For several years wehave been pursuing a vision of knowledgeon demand,the ability for all users to access knowledgeregardlessof time, location, deviceor level of expertise. This p...
Mark T. Maybury